Vulnerability Description
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. By writing specially crafted data to the `matrix_custom_frame` file, an attacker can cause the custom kernel driver to read more bytes than provided by user space. This data will be written into the RGB arguments which will be sent to the USB device. This issue has been patched in v3.10.2.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/openrazer/openrazer/commit/57610511d2548eda66999eaed5aa4517e8
- https://github.com/openrazer/openrazer/commit/d869abd20995b4931795e1cde54d4ac84d
- https://github.com/openrazer/openrazer/issues/2433
- https://github.com/openrazer/openrazer/security/advisories/GHSA-835j-6976-46jx
- https://lists.debian.org/debian-lts-announce/2025/04/msg00032.html
FAQ
What is CVE-2025-32776?
CVE-2025-32776 is a vulnerability with a CVSS score of 5.5 (MEDIUM). OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. By writing specially crafted data to the `matrix_custom_frame` file, an attac...
How severe is CVE-2025-32776?
CVE-2025-32776 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-32776?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.