Логотип exploitDog
bind:CVE-2025-38556
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-38556

Количество 20

Количество 20

ubuntu логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
redhat логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
msrc логотип

CVE-2025-38556

2 месяца назад

HID: core: Harden s32ton() against conversion to 0 bits

EPSS: Низкий
debian логотип

CVE-2025-38556

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: H ...

EPSS: Низкий
github логотип

GHSA-fr7f-qh29-24jq

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

EPSS: Низкий
fstec логотип

BDU:2025-10722

3 месяца назад

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
EPSS: Низкий
rocky логотип

RLSA-2025:17776

18 дней назад

Moderate: kernel security update

EPSS: Низкий
rocky логотип

RLSA-2025:16372

около 1 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17776

23 дня назад

ELSA-2025-17776: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-16372

около 1 месяца назад

ELSA-2025-16372: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17760

23 дня назад

ELSA-2025-17760: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03204-1

около 2 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3725-1

13 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03601-1

20 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03602-1

20 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03633-1

18 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3751-1

13 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03600-1

20 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03634-1

18 дней назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

CVSS3: 7.1
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-38556

HID: core: Harden s32ton() against conversion to 0 bits

0%
Низкий
2 месяца назад
debian логотип
CVE-2025-38556

In the Linux kernel, the following vulnerability has been resolved: H ...

0%
Низкий
3 месяца назад
github логотип
GHSA-fr7f-qh29-24jq

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-10722

Уязвимость функции s32ton() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
0%
Низкий
3 месяца назад
rocky логотип
RLSA-2025:17776

Moderate: kernel security update

18 дней назад
rocky логотип
RLSA-2025:16372

Moderate: kernel security update

около 1 месяца назад
oracle-oval логотип
ELSA-2025-17776

ELSA-2025-17776: kernel security update (MODERATE)

23 дня назад
oracle-oval логотип
ELSA-2025-16372

ELSA-2025-16372: kernel security update (MODERATE)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-17760

ELSA-2025-17760: kernel security update (MODERATE)

23 дня назад
suse-cvrf логотип
SUSE-SU-2025:03204-1

Security update for the Linux Kernel

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3725-1

Security update for the Linux Kernel

13 дней назад
suse-cvrf логотип
SUSE-SU-2025:03601-1

Security update for the Linux Kernel

20 дней назад
suse-cvrf логотип
SUSE-SU-2025:03602-1

Security update for the Linux Kernel

20 дней назад
suse-cvrf логотип
SUSE-SU-2025:03633-1

Security update for the Linux Kernel

18 дней назад
suse-cvrf логотип
SUSE-SU-2025:3751-1

Security update for the Linux Kernel

13 дней назад
suse-cvrf логотип
SUSE-SU-2025:03600-1

Security update for the Linux Kernel

20 дней назад
suse-cvrf логотип
SUSE-SU-2025:03634-1

Security update for the Linux Kernel

18 дней назад

Уязвимостей на страницу