VYPR

apk package

chainguard/linux-aws-6.12-boot-installed

pkg:apk/chainguard/linux-aws-6.12-boot-installed

Vulnerabilities (101)

  • CVE-2025-38678Sep 3, 2025
    affected < 6.12.60-r0fixed 6.12.60-r0

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is fo

  • CVE-2025-4598MedMay 30, 2025
    affected < 0fixed 0

    A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, load

  • CVE-2025-37803May 8, 2025
    affected < 6.12.57-r0fixed 6.12.57-r0

    In the Linux kernel, the following vulnerability has been resolved: udmabuf: fix a buf size overflow issue during udmabuf creation by casting size_limit_mb to u64 when calculate pglimit.

  • CVE-2025-40014Apr 18, 2025
    affected < 6.12.57-r0fixed 6.12.57-r0

    In the Linux kernel, the following vulnerability has been resolved: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() If speed_hz < AMD_SPI_MIN_HZ, amd_set_spi_freq() iterates over the entire amd_spi_freq array without breaking out early, causing 'i' to go

  • CVE-2025-37925Apr 18, 2025
    affected < 6.12.53-r0fixed 6.12.53-r0

    In the Linux kernel, the following vulnerability has been resolved: jfs: reject on-disk inodes of an unsupported type Syzbot has reported the following BUG: kernel BUG at fs/inode.c:668! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 3 UID: 0 PID: 139 Comm: jfsComm

  • CVE-2025-37860Apr 18, 2025
    affected < 6.12.57-r0fixed 6.12.57-r0

    In the Linux kernel, the following vulnerability has been resolved: sfc: fix NULL dereferences in ef100_process_design_param() Since cited commit, ef100_probe_main() and hence also ef100_check_design_params() run before efx->net_dev is created; consequently, we cannot netif_s

  • CVE-2025-23137Apr 16, 2025
    affected < 6.12.49-r0fixed 6.12.49-r0

    In the Linux kernel, the following vulnerability has been resolved: cpufreq/amd-pstate: Add missing NULL ptr check in amd_pstate_update Check if policy is NULL before dereferencing it in amd_pstate_update.

  • CVE-2025-23130Apr 16, 2025
    affected < 6.12.58-r0fixed 6.12.58-r0

    In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid panic once fallocation fails for pinfile syzbot reports a f2fs bug as below: ------------[ cut here ]------------ kernel BUG at fs/f2fs/segment.c:2746! CPU: 0 UID: 0 PID: 5323 Comm: syz.0.0

  • CVE-2025-22105Apr 16, 2025
    affected < 6.12.58-r0fixed 6.12.58-r0

    In the Linux kernel, the following vulnerability has been resolved: bonding: check xdp prog when set bond mode Following operations can trigger a warning[1]: ip netns add ns1 ip netns exec ns1 ip link add bond0 type bond mode balance-rr ip netns exec ns1 ip link se

  • CVE-2025-21949Apr 1, 2025
    affected < 0fixed 0

    In the Linux kernel, the following vulnerability has been resolved: LoongArch: Set hugetlb mmap base address aligned with pmd size With ltp test case "testcases/bin/hugefork02", there is a dmesg error report message such as: kernel BUG at mm/hugetlb.c:5550! Oops - BUG[#1]:

  • CVE-2025-21833Mar 6, 2025
    affected < 6.12.57-r0fixed 6.12.57-r0

    In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE There is a WARN_ON_ONCE to catch an unlikely situation when domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless happens we must avoid using a

  • CVE-2025-21751Feb 27, 2025
    affected < 6.12.49-r0fixed 6.12.49-r0

    In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, change error flow on matcher disconnect Currently, when firmware failure occurs during matcher disconnect flow, the error flow of the function reconnects the matcher back and returns an error, wh

  • CVE-2024-57995Feb 27, 2025
    affected < 6.12.57-r0fixed 6.12.57-r0

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() In ath12k_mac_assign_vif_to_vdev(), if arvif is created on a different radio, it gets deleted from that radio through a call to ath12

  • CVE-2023-39180Nov 18, 2024
    affected < 0fixed 0

    A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authenticatio

  • CVE-2023-39179Nov 18, 2024
    affected < 0fixed 0

    A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive i

  • CVE-2023-39176Nov 18, 2024
    affected < 0fixed 0

    A flaw was found within the parsing of SMB2 requests that have a transform header in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this

  • CVE-2023-4458Nov 14, 2024
    affected < 0fixed 0

    A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive i

  • CVE-2023-52904Aug 21, 2024
    affected < 0fixed 0

    In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() The subs function argument may be NULL, so do not use it before the NULL check.

  • CVE-2024-38381HigJun 21, 2024
    affected < 0fixed 0

    In the Linux kernel, the following vulnerability has been resolved: nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev->rx_q. It should be validated header size, payload size and

  • CVE-2023-6535Feb 7, 2024
    affected < 0fixed 0

    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial

Page 1 of 6