Количество 10
Количество 10
BDU:2026-00896
Уязвимость функции put_user() ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
CVE-2025-68753
In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().
CVE-2025-68753
In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().
CVE-2025-68753
ALSA: firewire-motu: add bounds check in put_user loop for DSP events
CVE-2025-68753
In the Linux kernel, the following vulnerability has been resolved: A ...
GHSA-fg49-cm53-vpfx
In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().
SUSE-SU-2026:0293-1
Security update for the Linux Kernel
SUSE-SU-2026:0315-1
Security update for the Linux Kernel
SUSE-SU-2026:0281-1
Security update for the Linux Kernel
SUSE-SU-2026:0278-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2026-00896 Уязвимость функции put_user() ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код | CVSS3: 5.5 | 0% Низкий | около 1 месяца назад | |
CVE-2025-68753 In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user(). | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68753 In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user(). | 0% Низкий | около 1 месяца назад | ||
CVE-2025-68753 ALSA: firewire-motu: add bounds check in put_user loop for DSP events | 0% Низкий | 30 дней назад | ||
CVE-2025-68753 In the Linux kernel, the following vulnerability has been resolved: A ... | 0% Низкий | около 1 месяца назад | ||
GHSA-fg49-cm53-vpfx In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user(). | 0% Низкий | около 1 месяца назад | ||
SUSE-SU-2026:0293-1 Security update for the Linux Kernel | 9 дней назад | |||
SUSE-SU-2026:0315-1 Security update for the Linux Kernel | 7 дней назад | |||
SUSE-SU-2026:0281-1 Security update for the Linux Kernel | 12 дней назад | |||
SUSE-SU-2026:0278-1 Security update for the Linux Kernel | 12 дней назад |
Уязвимостей на страницу