In the Linux kernel, the following vulnerability has been resolved:
HID: core: do not bypass hid_hw_raw_request
hid_hw_raw_request() is actually useful to ensure the provided buffer
and length are valid. Directly calling in the low level transport driver
function bypassed those checks and allowed invalid paramto be used.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 29 Jul 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Mon, 28 Jul 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | |
Title | HID: core: do not bypass hid_hw_raw_request | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-07-28T11:22:03.180Z
Updated: 2025-07-28T11:22:03.180Z
Reserved: 2025-04-16T04:51:24.022Z
Link: CVE-2025-38494

No data.

Status : Awaiting Analysis
Published: 2025-07-28T12:15:31.607
Modified: 2025-07-29T14:14:29.590
Link: CVE-2025-38494
