We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning of os_desc_qw_sign_store() and webusb_landingPage_store() to handle the zero-length input case gracefully by returning immediately.
Reserved 2025-04-16 | Published 2025-07-28 | Updated 2025-07-28 | Assigner Linuxgit.kernel.org/...c/2798111f8e504ac747cce911226135d50b8de468
git.kernel.org/...c/58bdd5160184645771553ea732da5c2887fc9bd1
git.kernel.org/...c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0
git.kernel.org/...c/22b7897c289cc25d99c603f5144096142a30d897
git.kernel.org/...c/3014168731b7930300aab656085af784edc861f6
Support options