Количество 15
Количество 15
BDU:2026-02834
Уязвимость модуля Bluetooth ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
CVE-2025-40301
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
CVE-2025-40301
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
CVE-2025-40301
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
CVE-2025-40301
Bluetooth: hci_event: validate skb length for unknown CC opcode
CVE-2025-40301
In the Linux kernel, the following vulnerability has been resolved: B ...
GHSA-mp66-rx49-f278
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
RLSA-2026:1690
Important: kernel security update
ELSA-2026-1690
ELSA-2026-1690: kernel security update (IMPORTANT)
ELSA-2026-50006
ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)
openSUSE-SU-2026:20145-1
Security update for the Linux Kernel
SUSE-SU-2026:0293-1
Security update for the Linux Kernel
SUSE-SU-2026:0315-1
Security update for the Linux Kernel
SUSE-SU-2026:0281-1
Security update for the Linux Kernel
SUSE-SU-2026:0278-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2026-02834 Уязвимость модуля Bluetooth ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании | CVSS3: 4.4 | 0% Низкий | 4 месяца назад | |
CVE-2025-40301 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data. | 0% Низкий | 4 месяца назад | ||
CVE-2025-40301 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data. | CVSS3: 7.1 | 0% Низкий | 4 месяца назад | |
CVE-2025-40301 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data. | 0% Низкий | 4 месяца назад | ||
CVE-2025-40301 Bluetooth: hci_event: validate skb length for unknown CC opcode | CVSS3: 7.1 | 0% Низкий | 4 месяца назад | |
CVE-2025-40301 In the Linux kernel, the following vulnerability has been resolved: B ... | 0% Низкий | 4 месяца назад | ||
GHSA-mp66-rx49-f278 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data. | 0% Низкий | 4 месяца назад | ||
RLSA-2026:1690 Important: kernel security update | около 2 месяцев назад | |||
ELSA-2026-1690 ELSA-2026-1690: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2026-50006 ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT) | 2 месяца назад | |||
openSUSE-SU-2026:20145-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2026:0293-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2026:0315-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2026:0281-1 Security update for the Linux Kernel | 2 месяца назад | |||
SUSE-SU-2026:0278-1 Security update for the Linux Kernel | 2 месяца назад |
Уязвимостей на страницу