CVE-2025-38494Buffer Access with Incorrect Length Value in Linux

Severity
7.8HIGHNVD
OSV5.5OSV3.2
EPSS
0.0%
top 99.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 28
Latest updateMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel3.155.4.297+7
Debianlinux/linux_kernel< 5.10.244-1+3
Ubuntulinux/linux_kernel< 5.15.0-163.173+1
CVEListV5linux/linux4fa5a7f76cc7b6ac87f57741edd2b124851d119fdd8e8314f2ce225dade5248dcfb9e2ac0edda624+8

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

34
OSV
linux-azure-6.8 vulnerabilities2026-03-25
OSV
linux-azure-fips vulnerabilities2026-03-04
OSV
linux-azure vulnerabilities2026-03-04
OSV
linux-ibm, linux-ibm-6.8 vulnerabilities2026-02-24
OSV
linux-xilinx vulnerabilities2026-02-24

📋Vendor Advisories

31
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-25
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-03-04
Ubuntu
Linux kernel (Xilinx) vulnerabilities2026-02-24
Ubuntu
Linux kernel (IBM) vulnerabilities2026-02-24
CVE-2025-38494 — Linux vulnerability | cvebase