In the Linux kernel, the following vulnerability has been resolved:
HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()
Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from
hid-thrustmaster driver. This array is passed to usb_check_int_endpoints
function from usb.c core driver, which executes a for loop that iterates
over the elements of the passed array. Not finding a null element at the end of
the array, it tries to read the next, non-existent element, crashing the kernel.
To fix this, a 0 element was added at the end of the array to break the for
loop.
[1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad
References
Configurations
Configuration 1 (hide)
|
History
01 Oct 2025, 20:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CWE | CWE-125 | |
References | () https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e - Patch | |
References | () https://git.kernel.org/stable/c/436f48c864186e9413d1b7c6e91767cc9e1a65b8 - Patch | |
References | () https://git.kernel.org/stable/c/73e36a699b9f46322ffb81f072a24e64f728dba7 - Patch | |
References | () https://git.kernel.org/stable/c/cdd9a1ea23ff1a272547217100663e8de4eada40 - Patch | |
References | () https://git.kernel.org/stable/c/f3ce05283f6cb6e19c220f5382def43dc5bd56b9 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
Summary |
|
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-10-01 20:18
NVD link : CVE-2025-21794
Mitre link : CVE-2025-21794
CVE.ORG link : CVE-2025-21794
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read