Количество 85
Количество 85

SUSE-SU-2025:02917-1
Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3)

SUSE-SU-2025:02909-1
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)

SUSE-SU-2025:02897-1
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4)

SUSE-SU-2025:02894-1
Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)

SUSE-SU-2025:02860-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)

SUSE-SU-2025:02859-1
Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)

SUSE-SU-2025:02857-1
Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3)

SUSE-SU-2025:02834-1
Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4)

SUSE-SU-2025:02833-1
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)

SUSE-SU-2025:02832-1
Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3)

SUSE-SU-2025:02821-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:02942-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)

SUSE-SU-2025:02858-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7)

CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.

CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.

CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.
CVE-2025-38494
In the Linux kernel, the following vulnerability has been resolved: H ...
ELSA-2025-20608
ELSA-2025-20608: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2025:03204-1
Security update for the Linux Kernel
GHSA-9ww5-wgf4-8cfm
In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:02917-1 Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02909-1 Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02897-1 Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02894-1 Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02860-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02859-1 Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02857-1 Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02834-1 Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02833-1 Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02832-1 Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02821-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | около 2 месяцев назад | ||
![]() | SUSE-SU-2025:02942-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | около 1 месяца назад | ||
![]() | SUSE-SU-2025:02858-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | около 1 месяца назад | ||
![]() | CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 2 месяца назад | |
![]() | CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | CVSS3: 7 | 0% Низкий | 2 месяца назад |
![]() | CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 2 месяца назад | |
CVE-2025-38494 In the Linux kernel, the following vulnerability has been resolved: H ... | 0% Низкий | 2 месяца назад | ||
ELSA-2025-20608 ELSA-2025-20608: Unbreakable Enterprise kernel security update (IMPORTANT) | 10 дней назад | |||
![]() | SUSE-SU-2025:03204-1 Security update for the Linux Kernel | 20 дней назад | ||
GHSA-9ww5-wgf4-8cfm In the Linux kernel, the following vulnerability has been resolved: HID: core: do not bypass hid_hw_raw_request hid_hw_raw_request() is actually useful to ensure the provided buffer and length are valid. Directly calling in the low level transport driver function bypassed those checks and allowed invalid paramto be used. | 0% Низкий | 2 месяца назад |
Уязвимостей на страницу