Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-32776
Awaiting Analysis
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-15 Apr, 2025 | 17:15
Updated At-15 Apr, 2025 | 18:39

OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. By writing specially crafted data to the `matrix_custom_frame` file, an attacker can cause the custom kernel driver to read more bytes than provided by user space. This data will be written into the RGB arguments which will be sent to the USB device. This issue has been patched in v3.10.2.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-125Primarysecurity-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/openrazer/openrazer/commit/57610511d2548eda66999eaed5aa4517e89d6d39security-advisories@github.com
N/A
https://github.com/openrazer/openrazer/commit/d869abd20995b4931795e1cde54d4ac84d9ca62fsecurity-advisories@github.com
N/A
https://github.com/openrazer/openrazer/issues/2433security-advisories@github.com
N/A
https://github.com/openrazer/openrazer/security/advisories/GHSA-835j-6976-46jxsecurity-advisories@github.com
N/A
Change History
0Changes found

Details not found