| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()\n\nSyzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from\nhid-thrustmaster driver. This array is passed to usb_check_int_endpoints\nfunction from usb.c core driver, which executes a for loop that iterates\nover the elements of the passed array. Not finding a null element at the end of\nthe array, it tries to read the next, non-existent element, crashing the kernel.\n\nTo fix this, a 0 element was added at the end of the array to break the for\nloop.\n\n[1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad" |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/hid/hid-thrustmaster.c" |
| ], |
| "versions": [ |
| { |
| "version": "220883fba32549a34f0734e4859d07f4dcd56992", |
| "lessThan": "436f48c864186e9413d1b7c6e91767cc9e1a65b8", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "ae730deded66150204c494282969bfa98dc3ae67", |
| "lessThan": "f3ce05283f6cb6e19c220f5382def43dc5bd56b9", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e5bcae4212a6a4b4204f46a1b8bcba08909d2007", |
| "lessThan": "cdd9a1ea23ff1a272547217100663e8de4eada40", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "816e84602900f7f951458d743fa12769635ebfd5", |
| "lessThan": "73e36a699b9f46322ffb81f072a24e64f728dba7", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "50420d7c79c37a3efe4010ff9b1bb14bc61ebccf", |
| "lessThan": "0b43d98ff29be3144e86294486b1373b5df74c0e", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/hid/hid-thrustmaster.c" |
| ], |
| "versions": [ |
| { |
| "version": "6.6.76", |
| "lessThan": "6.6.79", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.12.13", |
| "lessThan": "6.12.16", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.13.2", |
| "lessThan": "6.13.4", |
| "status": "affected", |
| "versionType": "semver" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.6.76", |
| "versionEndExcluding": "6.6.79" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.12.13", |
| "versionEndExcluding": "6.12.16" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.13.2", |
| "versionEndExcluding": "6.13.4" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/436f48c864186e9413d1b7c6e91767cc9e1a65b8" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/f3ce05283f6cb6e19c220f5382def43dc5bd56b9" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/cdd9a1ea23ff1a272547217100663e8de4eada40" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/73e36a699b9f46322ffb81f072a24e64f728dba7" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e" |
| } |
| ], |
| "title": "HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2025-21794", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |