CVE-2025-21794

In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from hid-thrustmaster driver. This array is passed to usb_check_int_endpoints function from usb.c core driver, which executes a for loop that iterates over the elements of the passed array. Not finding a null element at the end of the array, it tries to read the next, non-existent element, crashing the kernel. To fix this, a 0 element was added at the end of the array to break the for loop. [1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

01 Oct 2025, 20:18

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-125
References () https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e - () https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e - Patch
References () https://git.kernel.org/stable/c/436f48c864186e9413d1b7c6e91767cc9e1a65b8 - () https://git.kernel.org/stable/c/436f48c864186e9413d1b7c6e91767cc9e1a65b8 - Patch
References () https://git.kernel.org/stable/c/73e36a699b9f46322ffb81f072a24e64f728dba7 - () https://git.kernel.org/stable/c/73e36a699b9f46322ffb81f072a24e64f728dba7 - Patch
References () https://git.kernel.org/stable/c/cdd9a1ea23ff1a272547217100663e8de4eada40 - () https://git.kernel.org/stable/c/cdd9a1ea23ff1a272547217100663e8de4eada40 - Patch
References () https://git.kernel.org/stable/c/f3ce05283f6cb6e19c220f5382def43dc5bd56b9 - () https://git.kernel.org/stable/c/f3ce05283f6cb6e19c220f5382def43dc5bd56b9 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: hid-thrustmaster: corrección de lectura fuera de los límites de pila en usb_check_int_endpoints() Syzbot[1] ha detectado una lectura fuera de los límites de pila de la matriz ep_addr del controlador hid-thrustmaster. Esta matriz se pasa a la función usb_check_int_endpoints del controlador del núcleo usb.c, que ejecuta un bucle for que itera sobre los elementos de la matriz pasada. Al no encontrar un elemento nulo al final de la matriz, intenta leer el siguiente elemento inexistente, lo que hace que el kernel se bloquee. Para corregir esto, se agregó un elemento 0 al final de la matriz para romper el bucle for. [1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-10-01 20:18


NVD link : CVE-2025-21794

Mitre link : CVE-2025-21794

CVE.ORG link : CVE-2025-21794


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read