Количество 112
Количество 112
SUSE-SU-2025:03577-1
Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5)
SUSE-SU-2025:03575-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7)
SUSE-SU-2025:03563-1
Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6)
SUSE-SU-2025:03559-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5)
SUSE-SU-2025:03541-1
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4)
SUSE-SU-2025:03529-1
Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3)
SUSE-SU-2025:03496-1
Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5)
SUSE-SU-2025:03476-1
Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6)
SUSE-SU-2025:03475-1
Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5)
SUSE-SU-2025:03569-1
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6)
SUSE-SU-2025:03555-1
Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5)
SUSE-SU-2025:03554-1
Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5)
SUSE-SU-2025:03543-1
Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)
SUSE-SU-2025:03538-1
Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)
SUSE-SU-2025:03528-1
Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3)
SUSE-SU-2025:03504-1
Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3)
SUSE-SU-2025:03482-1
Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5)
SUSE-SU-2025:03472-1
Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6)
GHSA-c38j-rpqw-ch4h
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string.
BDU:2025-10743
Уязвимость функции memcpy ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:03577-1 Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5) | 23 дня назад | |||
SUSE-SU-2025:03575-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 24 дня назад | |||
SUSE-SU-2025:03563-1 Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 24 дня назад | |||
SUSE-SU-2025:03559-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5) | 24 дня назад | |||
SUSE-SU-2025:03541-1 Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) | 25 дней назад | |||
SUSE-SU-2025:03529-1 Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3) | 26 дней назад | |||
SUSE-SU-2025:03496-1 Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5) | 28 дней назад | |||
SUSE-SU-2025:03476-1 Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) | 29 дней назад | |||
SUSE-SU-2025:03475-1 Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) | 29 дней назад | |||
SUSE-SU-2025:03569-1 Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) | 24 дня назад | |||
SUSE-SU-2025:03555-1 Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) | 24 дня назад | |||
SUSE-SU-2025:03554-1 Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) | 24 дня назад | |||
SUSE-SU-2025:03543-1 Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | 25 дней назад | |||
SUSE-SU-2025:03538-1 Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) | 25 дней назад | |||
SUSE-SU-2025:03528-1 Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | 26 дней назад | |||
SUSE-SU-2025:03504-1 Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | 27 дней назад | |||
SUSE-SU-2025:03482-1 Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 28 дней назад | |||
SUSE-SU-2025:03472-1 Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) | 29 дней назад | |||
GHSA-c38j-rpqw-ch4h In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Use memcpy() for BIOS version The strlcat() with FORTIFY support is triggering a panic because it thinks the target buffer will overflow although the correct target buffer size is passed in. Anyway, instead of memset() with 0 followed by a strlcat(), just use memcpy() and ensure that the resulting buffer is NULL terminated. BIOSVersion is only used for the lpfc_printf_log() which expects a properly terminated string. | 0% Низкий | 4 месяца назад | ||
BDU:2025-10743 Уязвимость функции memcpy ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 8 | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу