Логотип exploitDog
bind:CVE-2025-38428
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-38428

Количество 6

Количество 6

ubuntu логотип

CVE-2025-38428

25 дней назад

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

EPSS: Низкий
redhat логотип

CVE-2025-38428

26 дней назад

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-38428

25 дней назад

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

EPSS: Низкий
msrc логотип

CVE-2025-38428

13 дней назад

EPSS: Низкий
debian логотип

CVE-2025-38428

25 дней назад

In the Linux kernel, the following vulnerability has been resolved: I ...

EPSS: Низкий
github логотип

GHSA-733g-xvvm-2g6j

25 дней назад

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38428

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

0%
Низкий
25 дней назад
redhat логотип
CVE-2025-38428

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

CVSS3: 5.5
0%
Низкий
26 дней назад
nvd логотип
CVE-2025-38428

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

0%
Низкий
25 дней назад
msrc логотип
0%
Низкий
13 дней назад
debian логотип
CVE-2025-38428

In the Linux kernel, the following vulnerability has been resolved: I ...

0%
Низкий
25 дней назад
github логотип
GHSA-733g-xvvm-2g6j

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"

0%
Низкий
25 дней назад

Уязвимостей на страницу