CVE-2025-38556

Source
https://cve.org/CVERecord?id=CVE-2025-38556
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38556.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38556
Downstream
Related
Published
2025-08-19T17:02:34.929Z
Modified
2026-03-20T12:42:55.129251Z
Summary
HID: core: Harden s32ton() against conversion to 0 bits
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: core: Harden s32ton() against conversion to 0 bits

Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that.

Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38556.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dde5845a529ff753364a6d1aea61180946270bfa
Fixed
6cdf6c708717c5c6897d0800a1793e83757c7491
Fixed
eeeaba737919bdce9885e2a00ac2912f61a3684d
Fixed
3c86548a20d7bc2861aa4de044991a327bebad1a
Fixed
810189546cb6c8f36443ed091d91f1f5d2fc2ec7
Fixed
d3b504146c111548ab60b6ef7aad00bfb1db05a2
Fixed
8b4a94b1510f6a46ec48494b52ee8f67eb4fc836
Fixed
865ad8469fa24de1559f247d9426ab01e5ce3a56
Fixed
a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38556.json"