CVE-2025-38507
Linux Debian vulnerability analysis and mitigation

Overview

A vulnerability in the Linux kernel's Nintendo HID driver has been identified as CVE-2025-38507, affecting kernel version 6.6 and potentially other versions. The issue specifically impacts the bluetooth suspend/resume functionality when using bluetooth-connected Nintendo controllers (NVD Database).

Technical details

The vulnerability relates to a stalling issue in the kernel's Nintendo HID driver during bluetooth suspend/resume operations. The problem occurs due to the resume hook added for USB joycons, which can cause the kernel to stall or panic when waiting for input reports during LED classdev suspend, particularly when connectivity to the controller is unreliable or lost prior to suspend (NVD Database).

Impact

When exploited, this vulnerability can cause kernel stalls or panics on affected systems, particularly impacting Android devices using kernel 6.6. The issue manifests when using bluetooth-connected controllers, potentially leading to system instability or unresponsiveness (NVD Database).

Mitigation and workarounds

The fix involves setting a new state value JOYCONCTLRSTATESUSPENDED in a newly-added nintendohidsuspend function and avoiding joyconinit() for bluetooth controllers in the nintendohidresume path. These changes have been tested with multiple suspend/resume flows in both USB and bluetooth modes (NVD Database).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management