In the Linux kernel, the following vulnerability has been resolved:
HID: core: do not bypass hidhwraw_request
hidhwraw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38494.json"
}[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"272643492498728699312436707135530503375",
"186855049693374707339250003292315744169",
"225100922310009537609744486758040646192",
"67832397050961635478400255479715632833",
"155094438414838162814495038209332928062"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-38494-a1f98b5d",
"target": {
"file": "drivers/hid/hid-core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c2ca42f190b6714d6c481dfd3d9b62ea091c946b"
},
{
"digest": {
"length": 654.0,
"function_hash": "180197737464126205764896850825804701517"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-38494-ec5f6650",
"target": {
"function": "__hid_request",
"file": "drivers/hid/hid-core.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c2ca42f190b6714d6c481dfd3d9b62ea091c946b"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38494.json"