Количество 20
Количество 20
CVE-2025-38556
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
CVE-2025-38556
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
CVE-2025-38556
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
CVE-2025-38556
HID: core: Harden s32ton() against conversion to 0 bits
CVE-2025-38556
In the Linux kernel, the following vulnerability has been resolved: H ...
GHSA-fr7f-qh29-24jq
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
BDU:2025-10722
Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2025:17776
Moderate: kernel security update
RLSA-2025:16372
Moderate: kernel security update
ELSA-2025-17776
ELSA-2025-17776: kernel security update (MODERATE)
ELSA-2025-16372
ELSA-2025-16372: kernel security update (MODERATE)
ELSA-2025-17760
ELSA-2025-17760: kernel security update (MODERATE)
SUSE-SU-2025:03204-1
Security update for the Linux Kernel
SUSE-SU-2025:3725-1
Security update for the Linux Kernel
SUSE-SU-2025:03601-1
Security update for the Linux Kernel
SUSE-SU-2025:03602-1
Security update for the Linux Kernel
SUSE-SU-2025:03633-1
Security update for the Linux Kernel
SUSE-SU-2025:3751-1
Security update for the Linux Kernel
SUSE-SU-2025:03600-1
Security update for the Linux Kernel
SUSE-SU-2025:03634-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-38556 In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does. | 0% Низкий | 3 месяца назад | ||
CVE-2025-38556 In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does. | CVSS3: 7.1 | 0% Низкий | 3 месяца назад | |
CVE-2025-38556 In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does. | 0% Низкий | 3 месяца назад | ||
CVE-2025-38556 HID: core: Harden s32ton() against conversion to 0 bits | 0% Низкий | 2 месяца назад | ||
CVE-2025-38556 In the Linux kernel, the following vulnerability has been resolved: H ... | 0% Низкий | 3 месяца назад | ||
GHSA-fr7f-qh29-24jq In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does. | 0% Низкий | 3 месяца назад | ||
BDU:2025-10722 Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.1 | 0% Низкий | 3 месяца назад | |
RLSA-2025:17776 Moderate: kernel security update | 18 дней назад | |||
RLSA-2025:16372 Moderate: kernel security update | около 1 месяца назад | |||
ELSA-2025-17776 ELSA-2025-17776: kernel security update (MODERATE) | 23 дня назад | |||
ELSA-2025-16372 ELSA-2025-16372: kernel security update (MODERATE) | около 1 месяца назад | |||
ELSA-2025-17760 ELSA-2025-17760: kernel security update (MODERATE) | 23 дня назад | |||
SUSE-SU-2025:03204-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2025:3725-1 Security update for the Linux Kernel | 13 дней назад | |||
SUSE-SU-2025:03601-1 Security update for the Linux Kernel | 20 дней назад | |||
SUSE-SU-2025:03602-1 Security update for the Linux Kernel | 20 дней назад | |||
SUSE-SU-2025:03633-1 Security update for the Linux Kernel | 18 дней назад | |||
SUSE-SU-2025:3751-1 Security update for the Linux Kernel | 13 дней назад | |||
SUSE-SU-2025:03600-1 Security update for the Linux Kernel | 20 дней назад | |||
SUSE-SU-2025:03634-1 Security update for the Linux Kernel | 18 дней назад |
Уязвимостей на страницу