0.0
NA
CVE-2025-39760
usb: core: config: Prevent OOB read in SS endpoint companion parsing
Description

In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size. Fix this up by checking the size first before looking at any of the fields in the descriptor.

INFO

Published Date :

Sept. 11, 2025, 5:15 p.m.

Last Modified :

Sept. 11, 2025, 5:15 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2025-39760 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

Solution
Update the Linux kernel to fix an out-of-bounds read vulnerability in USB endpoint parsing.
  • Apply kernel updates promptly.
  • Ensure systems use patched kernel versions.
  • Verify USB configuration parsing.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-39760 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-39760 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-39760 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-39760 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Sep. 11, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size. Fix this up by checking the size first before looking at any of the fields in the descriptor.
    Added Reference https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b
    Added Reference https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f
    Added Reference https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c
    Added Reference https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2
    Added Reference https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee
    Added Reference https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4
    Added Reference https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55
    Added Reference https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.