
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's Nintendo HID driver has been identified as CVE-2025-38507, affecting kernel version 6.6 and potentially other versions. The issue specifically impacts the bluetooth suspend/resume functionality when using bluetooth-connected Nintendo controllers (NVD Database).
The vulnerability relates to a stalling issue in the kernel's Nintendo HID driver during bluetooth suspend/resume operations. The problem occurs due to the resume hook added for USB joycons, which can cause the kernel to stall or panic when waiting for input reports during LED classdev suspend, particularly when connectivity to the controller is unreliable or lost prior to suspend (NVD Database).
When exploited, this vulnerability can cause kernel stalls or panics on affected systems, particularly impacting Android devices using kernel 6.6. The issue manifests when using bluetooth-connected controllers, potentially leading to system instability or unresponsiveness (NVD Database).
The fix involves setting a new state value JOYCONCTLRSTATESUSPENDED in a newly-added nintendohidsuspend function and avoiding joyconinit() for bluetooth controllers in the nintendohidresume path. These changes have been tested with multiple suspend/resume flows in both USB and bluetooth modes (NVD Database).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."