Search for packages
| purl | pkg:alpm/archlinux/linux-lts@5.15.2-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-aqgr-gkpx-g3ha | kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device |
CVE-2021-43976
|
| VCID-cmjx-jabf-6ufz | kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks |
CVE-2021-3759
|
| VCID-f6hp-rdqf-wqaw | kernel: low-privileged user privileges escalation |
CVE-2021-3847
|
| VCID-gs8w-v2yr-a7dg | kernel: possible use-after-free in bluetooth module |
CVE-2021-3752
|
| VCID-m1fw-z29h-ubdn | kernel: use-after-free in RDMA listen() |
CVE-2021-4028
|
| VCID-rt1a-aw8r-wqhr | kernel: KVM: NULL pointer dereference in kvm_dirty_ring_get() in virt/kvm/dirty_ring.c |
CVE-2021-4095
|
| VCID-wqrb-v41r-y7bn | kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts |
CVE-2021-3669
|
| VCID-x4nr-1xkv-5ubu | kernel: NULL pointer dereference in synic_get function in arch/x86/kvm/hyperv.c for certain accesses to the SynIC Hyper-V context |
CVE-2021-30178
|
| VCID-xtmf-n68y-53cf | kernel: Improper IO-uring request cancellation operation allows local users to cause a crash |
CVE-2021-4023
|
| VCID-zupm-5nps-ukbt | kernel: DoS due to BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF |
CVE-2021-29648
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:26:25.525143+00:00 | Arch Linux Importer | Fixing | VCID-zupm-5nps-ukbt | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.503281+00:00 | Arch Linux Importer | Fixing | VCID-x4nr-1xkv-5ubu | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.482093+00:00 | Arch Linux Importer | Fixing | VCID-wqrb-v41r-y7bn | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.458401+00:00 | Arch Linux Importer | Fixing | VCID-gs8w-v2yr-a7dg | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.437809+00:00 | Arch Linux Importer | Fixing | VCID-cmjx-jabf-6ufz | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.415026+00:00 | Arch Linux Importer | Fixing | VCID-f6hp-rdqf-wqaw | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.394717+00:00 | Arch Linux Importer | Fixing | VCID-xtmf-n68y-53cf | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.372026+00:00 | Arch Linux Importer | Fixing | VCID-m1fw-z29h-ubdn | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.350330+00:00 | Arch Linux Importer | Fixing | VCID-rt1a-aw8r-wqhr | https://security.archlinux.org/AVG-1741 | 38.0.0 |
| 2026-04-01T18:26:25.328653+00:00 | Arch Linux Importer | Fixing | VCID-aqgr-gkpx-g3ha | https://security.archlinux.org/AVG-1741 | 38.0.0 |