{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-21794","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-29T08:45:45.767Z","datePublished":"2025-02-27T02:18:30.907Z","dateUpdated":"2026-05-11T21:06:37.602Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:06:37.602Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()\n\nSyzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from\nhid-thrustmaster driver. This array is passed to usb_check_int_endpoints\nfunction from usb.c core driver, which executes a for loop that iterates\nover the elements of the passed array. Not finding a null element at the end of\nthe array, it tries to read the next, non-existent element, crashing the kernel.\n\nTo fix this, a 0 element was added at the end of the array to break the for\nloop.\n\n[1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/hid/hid-thrustmaster.c"],"versions":[{"version":"220883fba32549a34f0734e4859d07f4dcd56992","lessThan":"436f48c864186e9413d1b7c6e91767cc9e1a65b8","status":"affected","versionType":"git"},{"version":"ae730deded66150204c494282969bfa98dc3ae67","lessThan":"f3ce05283f6cb6e19c220f5382def43dc5bd56b9","status":"affected","versionType":"git"},{"version":"e5bcae4212a6a4b4204f46a1b8bcba08909d2007","lessThan":"cdd9a1ea23ff1a272547217100663e8de4eada40","status":"affected","versionType":"git"},{"version":"816e84602900f7f951458d743fa12769635ebfd5","lessThan":"73e36a699b9f46322ffb81f072a24e64f728dba7","status":"affected","versionType":"git"},{"version":"50420d7c79c37a3efe4010ff9b1bb14bc61ebccf","lessThan":"0b43d98ff29be3144e86294486b1373b5df74c0e","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/hid/hid-thrustmaster.c"],"versions":[{"version":"6.6.76","lessThan":"6.6.79","status":"affected","versionType":"semver"},{"version":"6.12.13","lessThan":"6.12.16","status":"affected","versionType":"semver"},{"version":"6.13.2","lessThan":"6.13.4","status":"affected","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.76","versionEndExcluding":"6.6.79"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.13","versionEndExcluding":"6.12.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13.2","versionEndExcluding":"6.13.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/436f48c864186e9413d1b7c6e91767cc9e1a65b8"},{"url":"https://git.kernel.org/stable/c/f3ce05283f6cb6e19c220f5382def43dc5bd56b9"},{"url":"https://git.kernel.org/stable/c/cdd9a1ea23ff1a272547217100663e8de4eada40"},{"url":"https://git.kernel.org/stable/c/73e36a699b9f46322ffb81f072a24e64f728dba7"},{"url":"https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e"}],"title":"HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.1,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2025-21794","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-10-01T19:28:58.615776Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-125","description":"CWE-125 Out-of-bounds Read"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-01T19:36:39.154Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:59:37.420Z"}}]}}