Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-38556— HID: core: Harden s32ton() against conversion to 0 bits

EPSS 0.02% · P7

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxdde5845a529ff753364a6d1aea61180946270bfa< 6cdf6c708717c5c6897d0800a1793e83757c7491affected
dde5845a529ff753364a6d1aea61180946270bfa< eeeaba737919bdce9885e2a00ac2912f61a3684daffected
dde5845a529ff753364a6d1aea61180946270bfa< 3c86548a20d7bc2861aa4de044991a327bebad1aaffected
dde5845a529ff753364a6d1aea61180946270bfa< 810189546cb6c8f36443ed091d91f1f5d2fc2ec7affected
dde5845a529ff753364a6d1aea61180946270bfa< d3b504146c111548ab60b6ef7aad00bfb1db05a2affected
dde5845a529ff753364a6d1aea61180946270bfa< 8b4a94b1510f6a46ec48494b52ee8f67eb4fc836affected
dde5845a529ff753364a6d1aea61180946270bfa< 865ad8469fa24de1559f247d9426ab01e5ce3a56affected
dde5845a529ff753364a6d1aea61180946270bfa< a6b87bfc2ab5bccb7ad953693c85d9062aef3fddaffected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-38556

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
HID: core: Harden s32ton() against conversion to 0 bits
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于s32ton函数在转换0位时未正确处理,可能导致崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux dde5845a529ff753364a6d1aea61180946270bfa ~ 6cdf6c708717c5c6897d0800a1793e83757c7491 -
LinuxLinux 2.6.20 -

II. Public POCs for CVE-2025-38556

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-38556

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-08-19 · 60 CVEs total

CVE-2025-38594iommu/vt-d: Fix UAF on sva unbind with pending IOPFs
CVE-2025-38614eventpoll: Fix semi-unbounded recursion
CVE-2025-38610powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()
CVE-2025-38609PM / devfreq: Check governor before using governor->name
CVE-2025-38608bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
CVE-2025-38612staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()
CVE-2025-38598drm/amdgpu: fix use-after-free in amdgpu_userq_suspend+0x51a/0x5a0
CVE-2025-38597drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port
CVE-2025-38595xen: fix UAF in dmabuf_exp_from_pages()
CVE-2025-38596drm/panthor: Fix UAF in panthor_gem_create_with_handle() debugfs code
CVE-2025-38599wifi: mt76: mt7996: Fix possible OOB access in mt7996_tx()
CVE-2025-38593Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'
CVE-2025-38592Bluetooth: hci_devcd_dump: fix out-of-bounds via dev_coredumpv
CVE-2025-38591bpf: Reject narrower access to pointer ctx fields
CVE-2025-38590net/mlx5e: Remove skb secpath if xfrm state is not found
CVE-2025-38589neighbour: Fix null-ptr-deref in neigh_flush_dev().
CVE-2025-38588ipv6: prevent infinite loop in rt6_nlmsg_size()
CVE-2025-38587ipv6: fix possible infinite loop in fib6_info_uses_dev()
CVE-2025-38586bpf, arm64: Fix fp initialization for exception boundary
CVE-2025-38585staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()

Showing top 20 of 60 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38556

No comments yet


Leave a comment