kernel-livepatch-6.1.84-99.169 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-6.1.84-99.169 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-27435

<0:1.0-0.amzn2023
  • H
Reachable Assertion

<0:1.0-0.amzn2023
  • H
Excessive Platform Resource Consumption within a Loop

<0:1.0-0.amzn2023
  • H
Improper Input Validation

<0:1.0-0.amzn2023
  • H
CVE-2024-27047

<0:1.0-0.amzn2023
  • H
Improper Neutralization of Null Byte or NUL Character

<0:1.0-0.amzn2023
  • H
Integer Underflow

<0:1.0-0.amzn2023
  • H
CVE-2024-35791

<0:1.0-0.amzn2023
  • H
CVE-2024-26973

<0:1.0-0.amzn2023
  • H
Improper Locking

<0:1.0-0.amzn2023
  • H
Improper Input Validation

<0:1.0-0.amzn2023
  • H
Memory Leak

<0:1.0-0.amzn2023
  • H
Memory Leak

<0:1.0-0.amzn2023
  • H
CVE-2024-35827

<0:1.0-0.amzn2023
  • H
CVE-2024-35823

<0:1.0-0.amzn2023
  • H
CVE-2024-35804

<0:1.0-0.amzn2023
  • H
CVE-2024-35826

<0:1.0-0.amzn2023
  • H
CVE-2024-35815

<0:1.0-0.amzn2023
  • H
CVE-2024-35800

<0:1.0-0.amzn2023
  • H
Improper Initialization

<0:1.0-0.amzn2023
  • H
CVE-2024-35801

<0:1.0-0.amzn2023
  • H
CVE-2024-35805

<0:1.0-0.amzn2023
  • H
Resource Injection

<0:1.0-0.amzn2023
  • H
CVE-2024-27038

<0:1.0-0.amzn2023
  • H
CVE-2024-35809

<0:1.0-0.amzn2023
  • H
Memory Leak

<0:1.0-0.amzn2023
  • H
Race Condition

<0:1.0-0.amzn2023
  • H
Use After Free

<0:1.0-0.amzn2023
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:1.0-0.amzn2023
  • H
Resource Leak

<0:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<0:1.0-0.amzn2023
  • H
Stack-based Buffer Overflow

<0:1.0-0.amzn2023
  • H
Improper Input Validation

<0:1.0-0.amzn2023
  • H
Integer Overflow or Wraparound

<0:1.0-0.amzn2023
  • H
Use After Free

<0:1.0-0.amzn2023
  • H
Resource Injection

<0:1.0-0.amzn2023
  • H
Race Condition

<0:1.0-0.amzn2023
  • H
Resource Injection

<0:1.0-0.amzn2023
  • H
Race Condition

<0:1.0-0.amzn2023
  • H
Use After Free

<0:1.0-0.amzn2023
  • H
Out-of-bounds Read

<0:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<0:1.0-0.amzn2023
  • H
Race Condition

<0:1.0-0.amzn2023
  • H
Race Condition

<0:1.0-0.amzn2023
  • H
Race Condition

<0:1.0-0.amzn2023
  • H
Return of Wrong Status Code

<0:1.0-0.amzn2023
  • H
CVE-2024-25742

<0:1.0-0.amzn2023
  • H
CVE-2023-52656

<0:1.0-0.amzn2023
  • H
CVE-2024-26977

<0:1.0-0.amzn2023
  • H
CVE-2024-27025

<0:1.0-0.amzn2023
  • H
CVE-2024-26960

<0:1.0-0.amzn2023
  • H
CVE-2024-27065

<0:1.0-0.amzn2023
  • H
CVE-2024-26964

<0:1.0-0.amzn2023
  • H
CVE-2024-26951

<0:1.0-0.amzn2023
  • H
CVE-2024-26950

<0:1.0-0.amzn2023
  • H
CVE-2024-26938

<0:1.0-0.amzn2023
  • H
Improper Locking

<0:1.0-0.amzn2023
  • H
CVE-2024-27390

<0:1.0-0.amzn2023
  • H
CVE-2024-27389

<0:1.0-0.amzn2023
  • H
CVE-2024-26976

<0:1.0-0.amzn2023
  • H
CVE-2024-26958

<0:1.0-0.amzn2023
  • H
CVE-2024-26946

<0:1.0-0.amzn2023
  • H
CVE-2024-26935

<0:1.0-0.amzn2023
  • M
Resource Injection

<0:1.0-0.amzn2023
  • M
Improper Initialization

<0:1.0-0.amzn2023
  • M
Race Condition

<0:1.0-0.amzn2023
  • M
CVE-2024-35809

<0:1.0-0.amzn2023
  • M
CVE-2024-35801

<0:1.0-0.amzn2023
  • M
Use After Free

<0:1.0-0.amzn2023
  • M
Stack-based Buffer Overflow

<0:1.0-0.amzn2023
  • M
Use After Free

<0:1.0-0.amzn2023
  • M
Out-of-bounds Read

<0:1.0-0.amzn2023
  • M
Return of Wrong Status Code

<0:1.0-0.amzn2023
  • M
Race Condition

<0:1.0-0.amzn2023
  • M
CVE-2024-25742

<0:1.0-0.amzn2023
  • M
Integer Overflow or Wraparound

<0:1.0-0.amzn2023