Количество 85
Количество 85

SUSE-SU-2025:02834-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4)

SUSE-SU-2025:02833-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

SUSE-SU-2025:02832-1
Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

SUSE-SU-2025:02821-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:02942-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)

SUSE-SU-2025:02858-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7)

CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.

CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.

CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.
CVE-2025-38495
In the Linux kernel, the following vulnerability has been resolved: H ...
GHSA-42gx-8xq5-j4pf
In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7.

SUSE-SU-2025:02848-1
Security update for the Linux Kernel

SUSE-SU-2025:02849-1
Security update for the Linux Kernel

CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.

CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.

CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.
CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: H ...
GHSA-9ww5-wgf4-8cfm
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.

SUSE-SU-2025:02846-1
Security update for the Linux Kernel
ELSA-2025-20551
ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:02834-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02833-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02832-1 Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02821-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02942-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02858-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | около 1 месяца назад | ||
![]() | CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | 0% Низкий | 2 месяца назад | |
![]() | CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | CVSS3: 7 | 0% Низкий | 2 месяца назад |
![]() | CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | 0% Низкий | 2 месяца назад | |
CVE-2025-38495 In the Linux kernel, the following vulnerability has been resolved: H ... | 0% Низкий | 2 месяца назад | ||
GHSA-42gx-8xq5-j4pf In the Linux kernel, the following vulnerability has been resolved: HID: core: ensure the allocated report buffer can contain the reserved report ID When the report ID is not used, the low level transport drivers expect the first byte to be 0. However, currently the allocated buffer not account for that extra byte, meaning that instead of having 8 guaranteed bytes for implement to be working, we only have 7. | 0% Низкий | 2 месяца назад | ||
![]() | SUSE-SU-2025:02848-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02849-1 Security update for the Linux Kernel | около 1 месяца назад | ||
![]() | CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 2 месяца назад | |
![]() | CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | CVSS3: 7 | 0% Низкий | 2 месяца назад |
![]() | CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 2 месяца назад | |
CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: H ... | 0% Низкий | 2 месяца назад | ||
GHSA-9ww5-wgf4-8cfm In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 2 месяца назад | ||
![]() | SUSE-SU-2025:02846-1 Security update for the Linux Kernel | около 1 месяца назад | ||
ELSA-2025-20551 ELSA-2025-20551: Unbreakable Enterprise kernel security update (IMPORTANT) | 24 дня назад |
Уязвимостей на страницу