In the Linux kernel, the following vulnerability has been resolved:
usb: net: sierra: check for no status endpoint
The driver checks for having three endpoints and
having bulk in and out endpoints, but not that
the third endpoint is interrupt input.
Rectify the omission.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Dec 2025, 19:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/0a263ccb905b4ae2af381cd4280bd8d2477b98b8 - Patch | |
| References | () https://git.kernel.org/stable/c/4c4ca3c46167518f8534ed70f6e3b4bf86c4d158 - Patch | |
| References | () https://git.kernel.org/stable/c/5408cc668e596c81cdd29e137225432aa40d1785 - Patch | |
| References | () https://git.kernel.org/stable/c/5849980faea1c792d1d5e54fdbf1e69ac0a9bfb9 - Patch | |
| References | () https://git.kernel.org/stable/c/5dd6a441748dad2f02e27b256984ca0b2d4546b6 - Patch | |
| References | () https://git.kernel.org/stable/c/65c666aff44eb7f9079c55331abd9687fb77ba2d - Patch | |
| References | () https://git.kernel.org/stable/c/a6a238c4126eb3ddb495d3f960193ca5bb778d92 - Patch | |
| References | () https://git.kernel.org/stable/c/bfe8ef373986e8f185d3d6613eb1801a8749837a - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Jul 2025, 14:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
28 Jul 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-28 12:15
Updated : 2025-12-22 19:29
NVD link : CVE-2025-38474
Mitre link : CVE-2025-38474
CVE.ORG link : CVE-2025-38474
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
