Логотип exploitDog
bind:"CVE-2025-38556" OR bind:"CVE-2023-53373" OR bind:"CVE-2025-38614" OR bind:"CVE-2025-39757"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38556" OR bind:"CVE-2023-53373" OR bind:"CVE-2025-38614" OR bind:"CVE-2025-39757"

Количество 44

Количество 44

oracle-oval логотип

ELSA-2025-17760

23 дня назад

ELSA-2025-17760: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:17776

18 дней назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17776

23 дня назад

ELSA-2025-17776: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
redhat логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
msrc логотип

CVE-2025-38556

2 месяца назад

HID: core: Harden s32ton() against conversion to 0 bits

EPSS: Низкий
debian логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: H ...

EPSS: Низкий
oracle-oval логотип

ELSA-2025-18297

16 дней назад

ELSA-2025-18297: kernel security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-fr7f-qh29-24jq

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
fstec логотип

BDU:2025-10722

4 месяца назад

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2023-53373

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

EPSS: Низкий
redhat логотип

CVE-2023-53373

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2023-53373

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

EPSS: Низкий
debian логотип

CVE-2023-53373

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: c ...

EPSS: Низкий
rocky логотип

RLSA-2025:16372

около 1 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-16372

около 1 месяца назад

ELSA-2025-16372: kernel security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-gxr7-4mfg-37c7

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

EPSS: Низкий
ubuntu логотип

CVE-2025-39757

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

EPSS: Низкий
redhat логотип

CVE-2025-39757

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-17760

ELSA-2025-17760: kernel security update (MODERATE)

23 дня назад
rocky логотип
RLSA-2025:17776

Moderate: kernel security update

18 дней назад
oracle-oval логотип
ELSA-2025-17776

ELSA-2025-17776: kernel security update (MODERATE)

23 дня назад
ubuntu логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-38556

HID: core: Harden s32ton() against conversion to 0 bits

0%
Низкий
2 месяца назад
debian логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: H ...

0%
Низкий
3 месяца назад
oracle-oval логотип
ELSA-2025-18297

ELSA-2025-18297: kernel security update (MODERATE)

16 дней назад
github логотип
GHSA-fr7f-qh29-24jq

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-10722

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: c ...

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2025:16372

Moderate: kernel security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-16372

ELSA-2025-16372: kernel security update (MODERATE)

около 1 месяца назад
github логотип
GHSA-gxr7-4mfg-37c7

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

CVSS3: 7.1
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу