CVE-2025-38548

Source
https://cve.org/CVERecord?id=CVE-2025-38548
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38548.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38548
Downstream
Related
Published
2025-08-16T11:34:16.889Z
Modified
2026-03-12T02:14:44.069275Z
Summary
hwmon: (corsair-cpro) Validate the size of the received input buffer
Details

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (corsair-cpro) Validate the size of the received input buffer

Add bufferrecvsize to store the size of the received bytes. Validate bufferrecvsize in sendusbcmd().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38548.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
40c3a445422579db8ad96c234dbe6c0ab3f6b936
Fixed
2e6f4d9cfbda52700c126c5a2b93dd2042e8680c
Fixed
4eb5cc48399f89b63acdbfe912fa5c8fe2900147
Fixed
0db770e2922389753ddbd6663a5516a32b97b743
Fixed
eda5e38cc4dd2dcb422840540374910ef2818494
Fixed
3c4bdc8a852e446080adc8ceb90ddd67a56e1bb8
Fixed
2771d2ee3d95700f34e1e4df6a445c90565cd4e9
Fixed
495a4f0dce9c8c4478c242209748f1ee9e4d5820

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38548.json"