We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32776

OpenRazer Vulnerable to Out of Bounds Read



Description

OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. By writing specially crafted data to the `matrix_custom_frame` file, an attacker can cause the custom kernel driver to read more bytes than provided by user space. This data will be written into the RGB arguments which will be sent to the USB device. This issue has been patched in v3.10.2.

Reserved 2025-04-10 | Published 2025-04-15 | Updated 2025-04-15 | Assigner GitHub_M


MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-125: Out-of-bounds Read

Product status

< 3.10.2
affected

References

github.com/...nrazer/security/advisories/GHSA-835j-6976-46jx

github.com/openrazer/openrazer/issues/2433

github.com/...ommit/57610511d2548eda66999eaed5aa4517e89d6d39

github.com/...ommit/d869abd20995b4931795e1cde54d4ac84d9ca62f

cve.org (CVE-2025-32776)

nvd.nist.gov (CVE-2025-32776)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32776

Support options

Helpdesk Chat, Email, Knowledgebase