CVE-2025-38558
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-28
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.13 (inc) to 6.15.10 (exc) |
| linux | linux_kernel | From 6.16 (inc) to 6.16.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's USB gadget UVC driver. It occurs because the color matching descriptor for frame-based formats was not initialized properly. When userspace configuration does not explicitly define this descriptor, the kernel code attempts to dereference a NULL pointer, causing a crash. This happens in the function uvcg_framebased_make due to uninitialized color matching descriptor handling.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel NULL pointer dereference), leading to system instability or denial of service. Specifically, if the affected USB gadget UVC driver is used and the userspace configuration omits the color matching descriptor, the system may experience a kernel crash.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel NULL pointer dereference crashes related to the USB gadget UVC driver. Specifically, look for kernel messages indicating a crash in uvcg_framebased_make or __uvcg_fill_strm functions, or messages similar to 'Unable to handle kernel NULL pointer dereference at virtual address 000000000000008c'. Checking dmesg or journalctl logs for such errors can help detect the issue. Example commands include: 'dmesg | grep -i uvcg' or 'journalctl -k | grep -i uvcg'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability, which initializes the color matching descriptor for frame-based formats to prevent the NULL pointer crash. Until an update is applied, avoid using userspace configurations via configfs that do not explicitly define the color matching descriptor for frame-based formats, as this triggers the crash.