kernel-livepatch-6.1.161-183.298

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-6.1.161-183.298 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Validation of Specified Index, Position, or Offset in Input

<1:1.0-0.amzn2023
  • H
CVE-2025-68366

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
Unchecked Return Value

<1:1.0-0.amzn2023
  • H
Deadlock

<1:1.0-0.amzn2023
  • H
Reachable Assertion

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
Expired Pointer Dereference

<1:1.0-0.amzn2023
  • H
CVE-2025-71084

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Missing Initialization of Resource

<1:1.0-0.amzn2023
  • H
Out-of-bounds Read

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
CVE-2025-71091

<1:1.0-0.amzn2023
  • H
Unchecked Return Value

<1:1.0-0.amzn2023
  • H
CVE-2025-68724

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
CVE-2025-68371

<1:1.0-0.amzn2023
  • H
Improperly Implemented Security Check for Standard

<1:1.0-0.amzn2023
  • H
Incorrect Conversion between Numeric Types

<1:1.0-0.amzn2023
  • H
Out-of-bounds Read

<1:1.0-0.amzn2023
  • H
Race Condition

<1:1.0-0.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:1.0-0.amzn2023
  • H
Expired Pointer Dereference

<1:1.0-0.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:1.0-0.amzn2023
  • H
Use After Free

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
CVE-2025-68337

<1:1.0-0.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:1.0-0.amzn2023
  • H
Deadlock

<1:1.0-0.amzn2023
  • H
Expired Pointer Dereference

<1:1.0-0.amzn2023
  • H
Use of Uninitialized Variable

<1:1.0-0.amzn2023
  • H
Out-of-bounds Read

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Improper Null Termination

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Improper Validation of Specified Type of Input

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Out-of-bounds Read

<1:1.0-0.amzn2023
  • H
Leftover Debug Code

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Use After Free

<1:1.0-0.amzn2023
  • H
Improper Handling of Inconsistent Special Elements

<1:1.0-0.amzn2023
  • H
Return of Wrong Status Code

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
Deadlock

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Integer Overflow or Wraparound

<1:1.0-0.amzn2023
  • H
Improper Update of Reference Count

<1:1.0-0.amzn2023
  • H
Incorrect Privilege Assignment

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Use of Externally-Controlled Format String

<1:1.0-0.amzn2023
  • H
CVE-2025-68728

<1:1.0-0.amzn2023
  • H
CVE-2025-68727

<1:1.0-0.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:1.0-0.amzn2023
  • H
Trust of System Event Data

<1:1.0-0.amzn2023
  • H
Improper Validation of Specified Quantity in Input

<1:1.0-0.amzn2023
  • H
CVE-2025-68264

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Incorrect Check of Function Return Value

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
CVE-2025-68325

<1:1.0-0.amzn2023
  • H
Use of Uninitialized Resource

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023