CVE-2025-21794
📋 TL;DR
A stack-out-of-bounds read vulnerability in the Linux kernel's hid-thrustmaster driver allows reading beyond allocated memory boundaries. This affects Linux systems using Thrustmaster USB HID devices and can lead to kernel crashes or potential information disclosure.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, potential information disclosure from kernel memory, or local privilege escalation if combined with other vulnerabilities.
Likely Case
System crash or instability when using Thrustmaster USB devices, requiring reboot to restore functionality.
If Mitigated
No impact if Thrustmaster USB devices are not used or if the vulnerable driver is not loaded.
🎯 Exploit Status
Exploitation requires physical access to connect a Thrustmaster USB device or ability to trigger the driver through other means. The vulnerability was discovered through fuzzing (syzbot).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits referenced in the CVE
Vendor Advisory: https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e
Restart Required: No
Instructions:
1. Update Linux kernel to a version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel packages. 3. Reboot to load the new kernel if not using kexec or livepatch capabilities.
🔧 Temporary Workarounds
Disable hid-thrustmaster driver
LinuxPrevent loading of the vulnerable driver module
echo 'blacklist hid-thrustmaster' >> /etc/modprobe.d/blacklist.conf
rmmod hid-thrustmaster
Restrict USB device access
LinuxPrevent unauthorized Thrustmaster USB devices from being connected
Use udev rules to block Thrustmaster vendor/product IDs
🧯 If You Can't Patch
- Disconnect all Thrustmaster USB devices from vulnerable systems
- Implement strict physical access controls to prevent unauthorized USB device connections
🔍 How to Verify
Check if Vulnerable:
Check if hid-thrustmaster driver is loaded: lsmod | grep hid_thrustmaster. If loaded and kernel version is before fix commits, system is vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Check kernel version is after fix commits and verify hid-thrustmaster driver functions normally with Thrustmaster devices.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- Oops messages in dmesg or /var/log/kern.log
- USB device connection errors for Thrustmaster devices
Network Indicators:
- None - this is a local driver vulnerability
SIEM Query:
Search for kernel panic or Oops messages containing 'hid-thrustmaster', 'usb_check_int_endpoints', or stack trace references
🔗 References
- https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e
- https://git.kernel.org/stable/c/436f48c864186e9413d1b7c6e91767cc9e1a65b8
- https://git.kernel.org/stable/c/73e36a699b9f46322ffb81f072a24e64f728dba7
- https://git.kernel.org/stable/c/cdd9a1ea23ff1a272547217100663e8de4eada40
- https://git.kernel.org/stable/c/f3ce05283f6cb6e19c220f5382def43dc5bd56b9
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html