CVE-2025-38548

NameCVE-2025-38548
DescriptionIn the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd().
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4327-1, DLA-4328-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1vulnerable
bullseye (security)5.10.244-1fixed
bookworm6.1.148-1fixed
bookworm (security)6.1.153-1fixed
trixie6.12.43-1fixed
trixie (security)6.12.48-1fixed
forky6.16.12-2fixed
sid6.17.7-1fixed
linux-6.1 (PTS)bullseye (security)6.1.153-1~deb11u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcebullseye5.10.244-1DLA-4327-1
linuxsourcebookworm6.1.147-1
linuxsourcetrixie6.12.41-1
linuxsource(unstable)6.16.3-1
linux-6.1sourcebullseye6.1.153-1~deb11u1DLA-4328-1

Notes

https://git.kernel.org/linus/495a4f0dce9c8c4478c242209748f1ee9e4d5820 (6.16-rc7)

Search for package or bug name: Reporting problems