kernel-livepatch-4.14.343-259.562 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-4.14.343-259.562 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-35835

<0:1.0-0.amzn2
  • M
Memory Leak

<0:1.0-0.amzn2
  • M
Use After Free

<0:1.0-0.amzn2
  • M
Double Free

<0:1.0-0.amzn2
  • M
Resource Injection

<0:1.0-0.amzn2
  • M
Improper Write Handling in Limited-write Non-Volatile Memories

<0:1.0-0.amzn2
  • M
Resource Injection

<0:1.0-0.amzn2
  • M
CVE-2024-27413

<0:1.0-0.amzn2
  • M
CVE-2023-52691

<0:1.0-0.amzn2
  • M
CVE-2023-52675

<0:1.0-0.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:1.0-0.amzn2
  • M
Memory Leak

<0:1.0-0.amzn2
  • M
CVE-2024-26920

<0:1.0-0.amzn2
  • M
Improper Input Validation

<0:1.0-0.amzn2
  • M
Race Condition

<0:1.0-0.amzn2
  • M
Improper Input Validation

<0:1.0-0.amzn2
  • M
Resource Injection

<0:1.0-0.amzn2
  • M
Resource Injection

<0:1.0-0.amzn2
  • M
Race Condition

<0:1.0-0.amzn2
  • M
Improper Handling of Values

<0:1.0-0.amzn2
  • M
Double Free

<0:1.0-0.amzn2
  • M
Resource Leak

<0:1.0-0.amzn2
  • M
CVE-2024-26805

<0:1.0-0.amzn2
  • M
Improper Handling of Values

<0:1.0-0.amzn2
  • M
Improper Handling of Length Parameter Inconsistency

<0:1.0-0.amzn2
  • M
Divide By Zero

<0:1.0-0.amzn2
  • M
Use After Free

<0:1.0-0.amzn2
  • M
CVE-2024-26764

<0:1.0-0.amzn2
  • M
Improper Resource Locking

<0:1.0-0.amzn2
  • M
Improper Input Validation

<0:1.0-0.amzn2
  • M
Deadlock

<0:1.0-0.amzn2
  • M
NULL Pointer Dereference

<0:1.0-0.amzn2
  • M
Resource Leak

<0:1.0-0.amzn2
  • M
Resource Injection

<0:1.0-0.amzn2
  • M
Improper Input Validation

<0:1.0-0.amzn2
  • M
Race Condition

<0:1.0-0.amzn2
  • M
Improper Input Validation

<0:1.0-0.amzn2
  • M
NULL Pointer Dereference

<0:1.0-0.amzn2
  • M
Improper Resource Locking

<0:1.0-0.amzn2
  • M
Improper Input Validation

<0:1.0-0.amzn2
  • M
Stack-based Buffer Overflow

<0:1.0-0.amzn2
  • M
Information Exposure

<0:1.0-0.amzn2
  • M
Deadlock

<0:1.0-0.amzn2
  • M
Resource Injection

<0:1.0-0.amzn2
  • M
Missing Initialization of a Variable

<0:1.0-0.amzn2
  • M
Resource Exhaustion

<0:1.0-0.amzn2
  • M
NULL Pointer Dereference

<0:1.0-0.amzn2
  • M
NULL Pointer Dereference

<0:1.0-0.amzn2
  • M
Improper Handling of Values

<0:1.0-0.amzn2
  • M
Buffer Access with Incorrect Length Value

<0:1.0-0.amzn2
  • M
Deadlock

<0:1.0-0.amzn2
  • M
CVE-2023-52698

<0:1.0-0.amzn2
  • M
Use After Free

<0:1.0-0.amzn2
  • M
Use After Free

<0:1.0-0.amzn2