Home

Description

In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() against conversion to 0 bits Testing by the syzbot fuzzer showed that the HID core gets a shift-out-of-bounds exception when it tries to convert a 32-bit quantity to a 0-bit quantity. Ideally this should never occur, but there are buggy devices and some might have a report field with size set to zero; we shouldn't reject the report or the device just because of that. Instead, harden the s32ton() routine so that it returns a reasonable result instead of crashing when it is called with the number of bits set to 0 -- the same as what snto32() does.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

dde5845a529ff753364a6d1aea61180946270bfa before d3b504146c111548ab60b6ef7aad00bfb1db05a2
affected

dde5845a529ff753364a6d1aea61180946270bfa before 8b4a94b1510f6a46ec48494b52ee8f67eb4fc836
affected

dde5845a529ff753364a6d1aea61180946270bfa before 865ad8469fa24de1559f247d9426ab01e5ce3a56
affected

dde5845a529ff753364a6d1aea61180946270bfa before a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd
affected

Default status
affected

2.6.20
affected

Any version before 2.6.20
unaffected

6.12.46
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/d3b504146c111548ab60b6ef7aad00bfb1db05a2

git.kernel.org/...c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836

git.kernel.org/...c/865ad8469fa24de1559f247d9426ab01e5ce3a56

git.kernel.org/...c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd

cve.org (CVE-2025-38556)

nvd.nist.gov (CVE-2025-38556)

Download JSON