Количество 165
Количество 165
SUSE-SU-2025:02857-1
Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)
SUSE-SU-2025:02834-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4)
SUSE-SU-2025:02833-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
SUSE-SU-2025:02832-1
Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)
SUSE-SU-2025:02821-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)
SUSE-SU-2025:02942-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)
SUSE-SU-2025:02858-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7)
CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.
CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.
CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.
CVE-2025-38495
HID: core: ensure the allocated report buffer can contain the reserved report ID
CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: H ...
GHSA-42gx-8xq5-j4pf
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.
BDU:2025-13517
Уязвимость драйвера Low Level Transport ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2025-20663
ELSA-2025-20663: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:02848-1
Security update for the Linux Kernel
SUSE-SU-2025:02849-1
Security update for the Linux Kernel
CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.
CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.
CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:02857-1 Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3) | 3 месяца назад | |||
SUSE-SU-2025:02834-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4) | 3 месяца назад | |||
SUSE-SU-2025:02833-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 3 месяца назад | |||
SUSE-SU-2025:02832-1 Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | 3 месяца назад | |||
SUSE-SU-2025:02821-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 3 месяца назад | |||
SUSE-SU-2025:02942-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 3 месяца назад | |||
SUSE-SU-2025:02858-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | 3 месяца назад | |||
CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | 0% Низкий | 4 месяца назад | ||
CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | CVSS3: 7 | 0% Низкий | 4 месяца назад | |
CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | 0% Низкий | 4 месяца назад | ||
CVE-2025-38495 HID: core: ensure the allocated report buffer can contain the reserved report ID | CVSS3: 7 | 0% Низкий | 2 месяца назад | |
CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: H ... | 0% Низкий | 4 месяца назад | ||
GHSA-42gx-8xq5-j4pf In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | 0% Низкий | 4 месяца назад | ||
BDU:2025-13517 Уязвимость драйвера Low Level Transport ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 4 месяца назад | |
ELSA-2025-20663 ELSA-2025-20663: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
SUSE-SU-2025:02848-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:02849-1 Security update for the Linux Kernel | 3 месяца назад | |||
CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 4 месяца назад | ||
CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | CVSS3: 7 | 0% Низкий | 4 месяца назад | |
CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу