CVE-2025-38495

In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 16:26

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/4f15ee98304b96e164ff2340e1dfd6181c3f42aa - () https://git.kernel.org/stable/c/4f15ee98304b96e164ff2340e1dfd6181c3f42aa - Patch
References () https://git.kernel.org/stable/c/7228e36c7875e4b035374cf68ca5e44dffa596b2 - () https://git.kernel.org/stable/c/7228e36c7875e4b035374cf68ca5e44dffa596b2 - Patch
References () https://git.kernel.org/stable/c/7fa83d0043370003e9a0b46ab7ae8f53b00fab06 - () https://git.kernel.org/stable/c/7fa83d0043370003e9a0b46ab7ae8f53b00fab06 - Patch
References () https://git.kernel.org/stable/c/9f2892f7233a8f1320fe671d0f95f122191bfbcd - () https://git.kernel.org/stable/c/9f2892f7233a8f1320fe671d0f95f122191bfbcd - Patch
References () https://git.kernel.org/stable/c/a262370f385e53ff7470efdcdaf40468e5756717 - () https://git.kernel.org/stable/c/a262370f385e53ff7470efdcdaf40468e5756717 - Patch
References () https://git.kernel.org/stable/c/a47d9d9895bad9ce0e840a39836f19ca0b2a343a - () https://git.kernel.org/stable/c/a47d9d9895bad9ce0e840a39836f19ca0b2a343a - Patch
References () https://git.kernel.org/stable/c/d3ed1d84a84538a39b3eb2055d6a97a936c108f2 - () https://git.kernel.org/stable/c/d3ed1d84a84538a39b3eb2055d6a97a936c108f2 - Patch
References () https://git.kernel.org/stable/c/fcda39a9c5b834346088c14b1374336b079466c1 - () https://git.kernel.org/stable/c/fcda39a9c5b834346088c14b1374336b079466c1 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/7228e36c7875e4b035374cf68ca5e44dffa596b2 -
  • () https://git.kernel.org/stable/c/7fa83d0043370003e9a0b46ab7ae8f53b00fab06 -
  • () https://git.kernel.org/stable/c/9f2892f7233a8f1320fe671d0f95f122191bfbcd -

29 Jul 2025, 14:14

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: núcleo: garantizar que el búfer de informe asignado pueda contener el ID de informe reservado. Cuando no se utiliza el ID de informe, los controladores de transporte de bajo nivel esperan que el primer byte sea 0. Sin embargo, actualmente el búfer asignado no tiene en cuenta ese byte adicional, lo que significa que en lugar de tener 8 bytes garantizados para que la implementación funcione, solo tenemos 7.

28 Jul 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-28 12:15

Updated : 2026-01-07 16:26


NVD link : CVE-2025-38495

Mitre link : CVE-2025-38495

CVE.ORG link : CVE-2025-38495


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel