{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-34-rt":"3-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"kernel-livepatch-MICRO-6-0-RT_Update_10","purl":"pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_10&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kernel-livepatch-MICRO-6-0-RT_Update_10 fixes the following issues:\n\n- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246030)\n- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247350)\n- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247351)\n","id":"SUSE-SU-2025:20781-1","modified":"2025-09-11T15:47:02Z","published":"2025-09-11T15:47:02Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202520781-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38212"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38495"}],"related":["CVE-2025-38212","CVE-2025-38494","CVE-2025-38495"],"summary":"Security update for kernel-livepatch-MICRO-6-0-RT_Update_10","upstream":["CVE-2025-38212","CVE-2025-38494","CVE-2025-38495"]}