Логотип exploitDog
bind:"CVE-2025-38556" OR bind:"CVE-2023-53373" OR bind:"CVE-2025-38614" OR bind:"CVE-2025-39757"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38556" OR bind:"CVE-2023-53373" OR bind:"CVE-2025-38614" OR bind:"CVE-2025-39757"

Количество 60

Количество 60

rocky логотип

RLSA-2025:17760

2 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17760

2 месяца назад

ELSA-2025-17760: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:17776

2 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17776

2 месяца назад

ELSA-2025-17776: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21063

4 дня назад

ELSA-2025-21063: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2025-38556

4 месяца назад

HID: core: Harden s32ton() against conversion to 0 bits

EPSS: Низкий
debian логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: H ...

CVSS3: 7.1
EPSS: Низкий
oracle-oval логотип

ELSA-2025-18297

2 месяца назад

ELSA-2025-18297: kernel security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-fr7f-qh29-24jq

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-10722

5 месяцев назад

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2023-53373

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2023-53373

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2023-53373

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2023-53373

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: c ...

CVSS3: 7.8
EPSS: Низкий
rocky логотип

RLSA-2025:16372

3 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-16372

3 месяца назад

ELSA-2025-16372: kernel security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-gxr7-4mfg-37c7

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:17760

Moderate: kernel security update

2 месяца назад
oracle-oval логотип
ELSA-2025-17760

ELSA-2025-17760: kernel security update (MODERATE)

2 месяца назад
rocky логотип
RLSA-2025:17776

Moderate: kernel security update

2 месяца назад
oracle-oval логотип
ELSA-2025-17776

ELSA-2025-17776: kernel security update (MODERATE)

2 месяца назад
oracle-oval логотип
ELSA-2025-21063

ELSA-2025-21063: kernel security update (MODERATE)

4 дня назад
ubuntu логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-38556

HID: core: Harden s32ton() against conversion to 0 bits

0%
Низкий
4 месяца назад
debian логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: H ...

CVSS3: 7.1
0%
Низкий
4 месяца назад
oracle-oval логотип
ELSA-2025-18297

ELSA-2025-18297: kernel security update (MODERATE)

2 месяца назад
github логотип
GHSA-fr7f-qh29-24jq

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-10722

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7.8
0%
Низкий
3 месяца назад
redhat логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7
0%
Низкий
3 месяца назад
nvd логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7.8
0%
Низкий
3 месяца назад
debian логотип
CVE-2023-53373

In the Linux kernel, the following vulnerability has been resolved: c ...

CVSS3: 7.8
0%
Низкий
3 месяца назад
rocky логотип
RLSA-2025:16372

Moderate: kernel security update

3 месяца назад
oracle-oval логотип
ELSA-2025-16372

ELSA-2025-16372: kernel security update (MODERATE)

3 месяца назад
github логотип
GHSA-gxr7-4mfg-37c7

In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Handle EBUSY correctly As it is seqiv only handles the special return value of EINPROGERSS, which means that in all other cases it will free data related to the request. However, as the caller of seqiv may specify MAY_BACKLOG, we also need to expect EBUSY and treat it in the same way. Otherwise backlogged requests will trigger a use-after-free.

CVSS3: 7.8
0%
Низкий
3 месяца назад

Уязвимостей на страницу