In the Linux kernel, the following vulnerability has been resolved:
HID: core: ensure the allocated report buffer can contain the reserved report ID
When the report ID is not used, the low level transport drivers expect
the first byte to be 0. However, currently the allocated buffer not
account for that extra byte, meaning that instead of having 8 guaranteed
bytes for implement to be working, we only have 7.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 16:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/4f15ee98304b96e164ff2340e1dfd6181c3f42aa - Patch | |
| References | () https://git.kernel.org/stable/c/7228e36c7875e4b035374cf68ca5e44dffa596b2 - Patch | |
| References | () https://git.kernel.org/stable/c/7fa83d0043370003e9a0b46ab7ae8f53b00fab06 - Patch | |
| References | () https://git.kernel.org/stable/c/9f2892f7233a8f1320fe671d0f95f122191bfbcd - Patch | |
| References | () https://git.kernel.org/stable/c/a262370f385e53ff7470efdcdaf40468e5756717 - Patch | |
| References | () https://git.kernel.org/stable/c/a47d9d9895bad9ce0e840a39836f19ca0b2a343a - Patch | |
| References | () https://git.kernel.org/stable/c/d3ed1d84a84538a39b3eb2055d6a97a936c108f2 - Patch | |
| References | () https://git.kernel.org/stable/c/fcda39a9c5b834346088c14b1374336b079466c1 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Jul 2025, 14:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
28 Jul 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-28 12:15
Updated : 2026-01-07 16:26
NVD link : CVE-2025-38495
Mitre link : CVE-2025-38495
CVE.ORG link : CVE-2025-38495
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
