CVE-2025-38016
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's HID bpf implementation. It occurs because the code assumes no output report or request will be processed after the device has been destroyed via hid_bpf_destroy_device(). However, if certain conditions are metβspecifically, if a device has LEDs on and the driver does not implement the request() functionβthen after the device is destroyed, a scheduled worker (hidinput_led_worker) still tries to send output reports. This leads to accessing a cleaned-up SRCU structure, causing a bug that can corrupt memory or cause failures. The issue arises from the way the HID bpf dispatch functions handle requests after device destruction, and it was fixed by adding checks to return early if the device is marked as destroyed.
How can this vulnerability impact me? :
This vulnerability can cause memory corruption or access to invalid memory areas in the Linux kernel when certain HID devices are unplugged. This can lead to system instability, crashes, or potentially exploitable conditions depending on the environment. The bug is triggered when devices with LEDs and uninplemented request() functions are removed, causing the kernel to access cleaned-up SRCU structures. Although the impact on architectures other than x86 is unclear, it is considered dangerous because it corrupts memory.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix which returns early in dispatch_hid_bpf_output_report() and dispatch_hid_bpf_raw_requests() if the hid_bpf device has been marked as destroyed. This prevents accessing cleaned-up SRCU structures after device removal. Avoid unplugging affected HID devices until the patch is applied.