Логотип exploitDog
bind:"GHSA-26mr-48wg-9jv2" OR bind:"CVE-2025-71196"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-26mr-48wg-9jv2" OR bind:"CVE-2025-71196"

Количество 8

Количество 8

github логотип

GHSA-26mr-48wg-9jv2

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

EPSS: Низкий
ubuntu логотип

CVE-2025-71196

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

EPSS: Низкий
redhat логотип

CVE-2025-71196

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

EPSS: Низкий
nvd логотип

CVE-2025-71196

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

EPSS: Низкий
debian логотип

CVE-2025-71196

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: p ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0962-1

11 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:1081-1

7 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20416-1

9 дней назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-26mr-48wg-9jv2

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-71196

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-71196

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-71196

In the Linux kernel, the following vulnerability has been resolved: phy: stm32-usphyc: Fix off by one in probe() The "index" variable is used as an index into the usbphyc->phys[] array which has usbphyc->nphys elements. So if it is equal to usbphyc->nphys then it is one element out of bounds. The "index" comes from the device tree so it's data that we trust and it's unlikely to be wrong, however it's obviously still worth fixing the bug. Change the > to >=.

0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-71196

In the Linux kernel, the following vulnerability has been resolved: p ...

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0962-1

Security update for the Linux Kernel

11 дней назад
suse-cvrf логотип
SUSE-SU-2026:1081-1

Security update for the Linux Kernel

7 дней назад
suse-cvrf логотип
openSUSE-SU-2026:20416-1

Security update for the Linux Kernel

9 дней назад

Уязвимостей на страницу