VYPR
High severity7.1NVD Advisory· Published Sep 4, 2025· Updated May 12, 2026

CVE-2025-38680

CVE-2025-38680

Description

In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()

The buffer length check before calling uvc_parse_format() only ensured that the buffer has at least 3 bytes (buflen > 2), buf the function accesses buffer[3], requiring at least 4 bytes.

This can lead to an out-of-bounds read if the buffer has exactly 3 bytes.

Fix it by checking that the buffer has at least 4 bytes in uvc_parse_format().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A 1-byte out-of-bounds read in the Linux kernel's UVC video driver (uvc_parse_format) can occur when parsing a malformed USB video descriptor with exactly 3 bytes.

Vulnerability

Description

The vulnerability resides in the Linux kernel's UVC (USB Video Class) driver. The function uvc_parse_format() accesses buffer[3] during parsing, but the preceding length check only ensures buflen > 2. Consequently, if a USB video descriptor provides exactly 3 bytes, the driver performs a one-byte out-of-bounds read [1]. This flaw was introduced because the buffer length validation was insufficient for the function's requirements.

Exploitation

Conditions

Exploitation requires a malicious USB video device that supplies a malformed descriptor with a length of exactly 3 bytes. An attacker would need physical access to the system or the ability to emulate a USB device. No authentication is required beyond the USB connection itself. The out-of-bounds read occurs during the parsing of the format descriptor, which is triggered when the device is enumerated.

Impact

An out-of-bounds read can lead to the disclosure of sensitive kernel memory or cause a system crash (denial of service). The CVSS v3 score of 7.1 (High) reflects the potential for significant confidentiality and availability impacts. The Siemens advisory [1] lists this CVE among many affecting the SIMATIC CN 4100 product line.

Mitigation

The fix adds a check for buflen >= 4 in uvc_parse_format(), ensuring the buffer is large enough before accessing index 3. Patches have been applied to the stable kernel trees [2][3][4]. Users should update to the latest kernel version. For affected Siemens products, upgrading to SIMATIC CN 4100 V5.0 remediates the issue [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Range: stable/c/9ad554217c9b945031c73df4e8176a475e2dea57
  • Linux/Linuxv5
    Range: 2.6.26

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

1