In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size. Fix this up by checking the size first before looking at any of the fields in the descriptor.
History

Fri, 12 Sep 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Vendors & Products Linux
Linux linux Kernel

Fri, 12 Sep 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Thu, 11 Sep 2025 17:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size. Fix this up by checking the size first before looking at any of the fields in the descriptor.
Title usb: core: config: Prevent OOB read in SS endpoint companion parsing
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2025-09-11T16:52:29.045Z

Updated: 2025-09-11T16:52:29.045Z

Reserved: 2025-04-16T07:20:57.126Z

Link: CVE-2025-39760

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-11T17:15:39.987

Modified: 2025-09-11T17:15:39.987

Link: CVE-2025-39760

cve-icon Redhat

Severity : Low

Publid Date: 2025-09-11T00:00:00Z

Links: CVE-2025-39760 - Bugzilla