Логотип exploitDog
bind:"CVE-2025-38556" OR bind:"CVE-2025-39757" OR bind:"CVE-2025-39761"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-38556" OR bind:"CVE-2025-39757" OR bind:"CVE-2025-39761"

Количество 47

Количество 47

rocky логотип

RLSA-2025:17776

2 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17776

2 месяца назад

ELSA-2025-17776: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:17760

2 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17760

2 месяца назад

ELSA-2025-17760: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2025-38556

4 месяца назад

HID: core: Harden s32ton() against conversion to 0 bits

EPSS: Низкий
debian логотип

CVE-2025-38556

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: H ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-fr7f-qh29-24jq

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-10722

5 месяцев назад

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2025-39761

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2025-39761

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-39761

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
EPSS: Низкий
msrc логотип

CVE-2025-39761

3 месяца назад

wifi: ath12k: Decrement TID on RX peer frag setup error handling

EPSS: Низкий
debian логотип

CVE-2025-39761

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.1
EPSS: Низкий
rocky логотип

RLSA-2025:16372

3 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-16372

3 месяца назад

ELSA-2025-16372: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-39757

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

EPSS: Низкий
redhat логотип

CVE-2025-39757

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:17776

Moderate: kernel security update

2 месяца назад
oracle-oval логотип
ELSA-2025-17776

ELSA-2025-17776: kernel security update (MODERATE)

2 месяца назад
rocky логотип
RLSA-2025:17760

Moderate: kernel security update

2 месяца назад
oracle-oval логотип
ELSA-2025-17760

ELSA-2025-17760: kernel security update (MODERATE)

2 месяца назад
ubuntu логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-38556

HID: core: Harden s32ton() against conversion to 0 bits

0%
Низкий
4 месяца назад
debian логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: H ...

CVSS3: 7.1
0%
Низкий
4 месяца назад
github логотип
GHSA-fr7f-qh29-24jq

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-10722

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-39761

wifi: ath12k: Decrement TID on RX peer frag setup error handling

0%
Низкий
3 месяца назад
debian логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.1
0%
Низкий
3 месяца назад
rocky логотип
RLSA-2025:16372

Moderate: kernel security update

3 месяца назад
oracle-oval логотип
ELSA-2025-16372

ELSA-2025-16372: kernel security update (MODERATE)

3 месяца назад
ubuntu логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

CVSS3: 7.1
0%
Низкий
3 месяца назад

Уязвимостей на страницу