Количество 10
Количество 10
CVE-2025-40301
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
CVE-2025-40301
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
CVE-2025-40301
Bluetooth: hci_event: validate skb length for unknown CC opcode
CVE-2025-40301
In the Linux kernel, the following vulnerability has been resolved: B ...
GHSA-mp66-rx49-f278
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data.
ELSA-2026-50006
ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2026:0293-1
Security update for the Linux Kernel
SUSE-SU-2026:0315-1
Security update for the Linux Kernel
SUSE-SU-2026:0281-1
Security update for the Linux Kernel
SUSE-SU-2026:0278-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-40301 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data. | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-40301 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data. | 0% Низкий | около 2 месяцев назад | ||
CVE-2025-40301 Bluetooth: hci_event: validate skb length for unknown CC opcode | CVSS3: 7.1 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-40301 In the Linux kernel, the following vulnerability has been resolved: B ... | 0% Низкий | около 2 месяцев назад | ||
GHSA-mp66-rx49-f278 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may leave the skb empty. If so, using skb->data[0] for the return status uses un-init memory. The fix is to check skb->len before using skb->data. | 0% Низкий | около 2 месяцев назад | ||
ELSA-2026-50006 ELSA-2026-50006: Unbreakable Enterprise kernel security update (IMPORTANT) | 23 дня назад | |||
SUSE-SU-2026:0293-1 Security update for the Linux Kernel | 9 дней назад | |||
SUSE-SU-2026:0315-1 Security update for the Linux Kernel | 7 дней назад | |||
SUSE-SU-2026:0281-1 Security update for the Linux Kernel | 12 дней назад | |||
SUSE-SU-2026:0278-1 Security update for the Linux Kernel | 12 дней назад |
Уязвимостей на страницу