Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-38548

Опубликовано: 16 авг. 2025
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd().

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxunfixedpackage
linuxfixed6.12.41-1trixiepackage
linuxfixed6.1.147-1bookwormpackage

Примечания

  • https://git.kernel.org/linus/495a4f0dce9c8c4478c242209748f1ee9e4d5820 (6.16-rc7)

EPSS

Процентиль: 5%
0.00024
Низкий

Связанные уязвимости

ubuntu
8 дней назад

In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd().

CVSS3: 5.5
redhat
10 дней назад

In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd().

nvd
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd().

github
9 дней назад

In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd().

EPSS

Процентиль: 5%
0.00024
Низкий