Логотип exploitDog
bind:"CVE-2025-39761" OR bind:"CVE-2025-38556" OR bind:"CVE-2025-39757"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-39761" OR bind:"CVE-2025-38556" OR bind:"CVE-2025-39757"

Количество 37

Количество 37

rocky логотип

RLSA-2025:17776

18 дней назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17776

23 дня назад

ELSA-2025-17776: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-39761

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

EPSS: Низкий
redhat логотип

CVE-2025-39761

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-39761

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

EPSS: Низкий
msrc логотип

CVE-2025-39761

около 2 месяцев назад

wifi: ath12k: Decrement TID on RX peer frag setup error handling

EPSS: Низкий
debian логотип

CVE-2025-39761

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: w ...

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17760

23 дня назад

ELSA-2025-17760: kernel security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-55f8-prfx-mfvw

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17377

29 дней назад

ELSA-2025-17377: kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-39757

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

EPSS: Низкий
redhat логотип

CVE-2025-39757

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-39757

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

EPSS: Низкий
msrc логотип

CVE-2025-39757

около 2 месяцев назад

ALSA: usb-audio: Validate UAC3 cluster segment descriptors

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-39757

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: A ...

EPSS: Низкий
ubuntu логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
redhat логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
msrc логотип

CVE-2025-38556

2 месяца назад

HID: core: Harden s32ton() against conversion to 0 bits

EPSS: Низкий
debian логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: H ...

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2025:17776

Moderate: kernel security update

18 дней назад
oracle-oval логотип
ELSA-2025-17776

ELSA-2025-17776: kernel security update (MODERATE)

23 дня назад
ubuntu логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

CVSS3: 7.1
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-39761

wifi: ath12k: Decrement TID on RX peer frag setup error handling

0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-39761

In the Linux kernel, the following vulnerability has been resolved: w ...

0%
Низкий
около 2 месяцев назад
oracle-oval логотип
ELSA-2025-17760

ELSA-2025-17760: kernel security update (MODERATE)

23 дня назад
github логотип
GHSA-55f8-prfx-mfvw

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Decrement TID on RX peer frag setup error handling Currently, TID is not decremented before peer cleanup, during error handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to out-of-bounds access in peer->rx_tid[]. Hence, add a decrement operation for TID, before peer cleanup to ensures proper cleanup and prevents out-of-bounds access issues when the RX peer frag setup fails. Found during code review. Compile tested only.

0%
Низкий
около 2 месяцев назад
oracle-oval логотип
ELSA-2025-17377

ELSA-2025-17377: kernel security update (MODERATE)

29 дней назад
ubuntu логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

CVSS3: 7.1
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 cluster segment descriptors UAC3 class segment descriptors need to be verified whether their sizes match with the declared lengths and whether they fit with the allocated buffer sizes, too. Otherwise malicious firmware may lead to the unexpected OOB accesses.

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-39757

ALSA: usb-audio: Validate UAC3 cluster segment descriptors

CVSS3: 7.8
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-39757

In the Linux kernel, the following vulnerability has been resolved: A ...

0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-38556

HID: core: Harden s32ton() against conversion to 0 bits

0%
Низкий
2 месяца назад
debian логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: H ...

0%
Низкий
3 месяца назад

Уязвимостей на страницу