CVE-2025-39818

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-39818
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39818.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39818
Downstream
Published
2025-09-16T13:00:18.490Z
Modified
2025-12-02T19:00:30.882446Z
Summary
HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save

Improper use of secondary pointer (&dev->i2csubipregs) caused kernel crash and out-of-bounds error:

BUG: KASAN: slab-out-of-bounds in regmapbulk_read+0x449/0x510 Write of size 4 at addr ffff888136005dc0 by task kworker/u33:5/5107

CPU: 3 UID: 0 PID: 5107 Comm: kworker/u33:5 Not tainted 6.16.0+ #3 PREEMPT(voluntary) Workqueue: async asyncrunentryfn Call Trace: <TASK> dumpstacklvl+0x76/0xa0 printreport+0xd1/0x660 ? pfxrawspinlockirqsave+0x10/0x10 ? kasancompletemodereportinfo+0x26/0x200 kasanreport+0xe1/0x120 ? regmapbulkread+0x449/0x510 ? _regmapbulkread+0x449/0x510 asanreportstore4noabort+0x17/0x30 regmapbulkread+0x449/0x510 ? _pfxregmapbulkread+0x10/0x10 regmapbulkread+0x270/0x3d0 piocomplete+0x1ee/0x2c0 [intelthc] ? _pfxpiocomplete+0x10/0x10 [intelthc] ? _pfxpiowait+0x10/0x10 [intelthc] ? regmapupdatebitsbase+0x13b/0x1f0 thci2csubippioread+0x117/0x270 [intelthc] thci2csubipregssave+0xc2/0x140 [intelthc] ? _pfxthci2csubipregssave+0x10/0x10 [intelthc] [...] The buggy address belongs to the object at ffff888136005d00 which belongs to the cache kmalloc-rnd-12-192 of size 192 The buggy address is located 0 bytes to the right of allocated 192-byte region [ffff888136005d00, ffff888136005dc0)

Replaced with direct array indexing (&dev->i2csubipregs[i]) to ensure safe memory access.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39818.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4228966def884c6e34b85cdc7118c5d013e1718f
Fixed
78d4cf0466c79452e47aa6f720afbde63e709ccc
Fixed
a7fc15ed629be89e51e09b743277c53e0a0168f5

Affected versions

v6.*

v6.13
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.15
v6.15-rc1
v6.15-rc2
v6.15-rc3
v6.15-rc4
v6.15-rc5
v6.15-rc6
v6.15-rc7
v6.16
v6.16-rc1
v6.16-rc2
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.16.1
v6.16.2
v6.16.3
v6.16.4

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39818.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.16.5

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39818.json"