-
CVE-2025-38103
- EPSS 0.04%
- Veröffentlicht 03.07.2025 08:35:13
- Zuletzt bearbeitet 03.07.2025 15:13:53
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() Update struct hid_descriptor to better reflect the mandatory and optional parts of the HID Descriptor as per USB HID 1.11 specification. Note: the kernel currently does not parse any optional HID class descriptors, only the mandatory report descriptor. Update all references to member element desc[0] to rpt_desc. Add test to verify bLength and bNumDescriptors values are valid. Replace the for loop with direct access to the mandatory HID class descriptor member for the report descriptor. This eliminates the possibility of getting an out-of-bounds fault. Add a warning message if the HID descriptor contains any unsupported optional HID class descriptors.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version <
41827a2dbdd7880df9881506dee13bc88d4230bb
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version <
1df80d748f984290c895e843401824215dcfbfb0
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version <
a8f842534807985d3a676006d140541b87044345
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version <
4fa7831cf0ac71a0a345369d1a6084f2b096e55e
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version <
74388368927e9c52a69524af5bbd6c55eb4690de
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version <
485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version <
fe7f7ac8e0c708446ff017453add769ffc15deed
Version
f043bfc98c193c284e2cd768fefabe18ac2fed9b
Status
affected
Version
99de0781e0de7c866f762b931351c2a501c3074f
Status
affected
Version
8d675aa967d3927ac100f7af48f2a2af8a041d2d
Status
affected
Version
f4cf5d75416ae3d79e03179fe6f4b9f1231ae42c
Status
affected
Version
439f76690d7d5dd212ea7bebc1f2fa077e3d645d
Status
affected
Version
2929cb995378205bceda86d6fd3cbc22e522f97f
Status
affected
Version
57265cddde308292af881ce634a5378dd4e25900
Status
affected
Version
984154e7eef1f9e543dabd7422cfc99015778732
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.14
Status
affected
Version <
4.14
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.295
Status
unaffected
Version <=
5.10.*
Version
5.10.239
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.94
Status
unaffected
Version <=
6.12.*
Version
6.12.34
Status
unaffected
Version <=
6.15.*
Version
6.15.3
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.097 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|