CVE-2025-38494

Source
https://cve.org/CVERecord?id=CVE-2025-38494
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38494.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38494
Downstream
Related
Published
2025-07-28T11:22:03.180Z
Modified
2026-03-20T12:42:53.439884Z
Summary
HID: core: do not bypass hid_hw_raw_request
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: core: do not bypass hidhwraw_request

hidhwraw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38494.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4fa5a7f76cc7b6ac87f57741edd2b124851d119f
Fixed
dd8e8314f2ce225dade5248dcfb9e2ac0edda624
Fixed
40e25aa7e4e0f2440c73a683ee448e41c7c344ed
Fixed
f10923b8d32a473b229477b63f23bbd72b1e9910
Fixed
a62a895edb2bfebffa865b5129a66e3b4287f34f
Fixed
0e5017d84d650ca0eeaf4a3fe9264c5dbc886b81
Fixed
d18f63e848840100dbc351a82e7042eac5a28cf5
Fixed
19d1314d46c0d8a5c08ab53ddeb62280c77698c0
Fixed
c2ca42f190b6714d6c481dfd3d9b62ea091c946b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38494.json"