In the Linux kernel, the following vulnerability has been resolved:
HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()
Update struct hid_descriptor to better reflect the mandatory and
optional parts of the HID Descriptor as per USB HID 1.11 specification.
Note: the kernel currently does not parse any optional HID class
descriptors, only the mandatory report descriptor.
Update all references to member element desc[0] to rpt_desc.
Add test to verify bLength and bNumDescriptors values are valid.
Replace the for loop with direct access to the mandatory HID class
descriptor member for the report descriptor. This eliminates the
possibility of getting an out-of-bounds fault.
Add a warning message if the HID descriptor contains any unsupported
optional HID class descriptors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Dec 2025, 17:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0 - Patch | |
| References | () https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb - Patch | |
| References | () https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf - Patch | |
| References | () https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e - Patch | |
| References | () https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de - Patch | |
| References | () https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b - Patch | |
| References | () https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345 - Patch | |
| References | () https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CWE | CWE-125 | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:4.14:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.14:rc8:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.14:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.14:-:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
03 Jul 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-03 09:15
Updated : 2025-12-16 17:03
NVD link : CVE-2025-38103
Mitre link : CVE-2025-38103
CVE.ORG link : CVE-2025-38103
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
