CVE-2025-38556

7.1 HIGH

📋 TL;DR

A vulnerability in the Linux kernel's HID core allows a shift-out-of-bounds exception when converting 32-bit quantities to 0-bit quantities. This could lead to kernel crashes or potential privilege escalation if exploited. Affects Linux systems with HID devices, particularly those using buggy hardware with malformed reports.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but patches available for multiple stable branches.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires interaction with HID devices that send malformed reports with zero-bit fields.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to kernel mode if combined with other vulnerabilities.

🟠

Likely Case

System instability or crash when interacting with malformed HID devices, causing denial of service.

🟢

If Mitigated

Minor system instability that self-recovers or requires reboot.

🌐 Internet-Facing: LOW - Requires physical or local access to HID devices.
🏢 Internal Only: MEDIUM - Internal users with access to vulnerable HID devices could cause system crashes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to a vulnerable HID device or ability to send malformed HID reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commits: 3c86548a20d7bc2861aa4de044991a327bebad1a, 6cdf6c708717c5c6897d0800a1793e83757c7491, 810189546cb6c8f36443ed091d91f1f5d2fc2ec7, 865ad8469fa24de1559f247d9426ab01e5ce3a56, 8b4a94b1510f6a46ec48494b52ee8f67eb4fc836

Vendor Advisory: https://git.kernel.org/stable/c/

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Restrict HID device access

linux

Limit physical access to HID devices and use device authorization controls.

# Use udev rules to restrict device access
# Example: Create /etc/udev/rules.d/99-hid-restrict.rules

🧯 If You Can't Patch

  • Implement strict physical security controls for HID devices
  • Monitor system logs for kernel panic or crash events related to HID

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions. Use: uname -r and check if commit is present in kernel source.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check that s32ton() hardening commits are present in kernel source.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • HID-related error messages in dmesg
  • System crash reports

Network Indicators:

  • Not network exploitable

SIEM Query:

source="kernel" AND ("panic" OR "HID" OR "shift-out-of-bounds")

🔗 References

📤 Share & Export