kernel-livepatch-6.12.77-99.140

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-6.12.77-99.140 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Time-of-check Time-of-use (TOCTOU)

<1:1.0-0.amzn2023
  • H
Use of Uninitialized Resource

<1:1.0-0.amzn2023
  • H
Incorrect Pointer Scaling

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
Operation on a Resource after Expiration or Release

<1:1.0-0.amzn2023
  • H
Access of Uninitialized Pointer

<1:1.0-0.amzn2023
  • H
Missing Initialization of Resource

<1:1.0-0.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:1.0-0.amzn2023
  • H
Improper Validation of Specified Index, Position, or Offset in Input

<1:1.0-0.amzn2023
  • H
Improper Update of Reference Count

<1:1.0-0.amzn2023
  • H
Out-of-bounds Write

<1:1.0-0.amzn2023
  • H
Integer Overflow or Wraparound

<1:1.0-0.amzn2023
  • H
Integer Overflow or Wraparound

<1:1.0-0.amzn2023
  • H
Plaintext Storage of a Password

<1:1.0-0.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:1.0-0.amzn2023
  • H
Processor Optimization Removal or Modification of Security-critical Code

<1:1.0-0.amzn2023
  • H
Expired Pointer Dereference

<1:1.0-0.amzn2023
  • H
Improper Resource Locking

<1:1.0-0.amzn2023
  • H
Improper Update of Reference Count

<1:1.0-0.amzn2023
  • H
Expired Pointer Dereference

<1:1.0-0.amzn2023
  • H
Race Condition

<1:1.0-0.amzn2023
  • H
Missing Initialization of Resource

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Release of Invalid Pointer or Reference

<1:1.0-0.amzn2023
  • H
Improper Validation of Consistency within Input

<1:1.0-0.amzn2023
  • H
Deadlock

<1:1.0-0.amzn2023
  • H
Use After Free

<1:1.0-0.amzn2023
  • H
CVE-2025-71265

<1:1.0-0.amzn2023
  • H
CVE-2026-23244

<1:1.0-0.amzn2023
  • H
CVE-2025-71267

<1:1.0-0.amzn2023
  • H
Protection Mechanism Failure

<1:1.0-0.amzn2023
  • H
Race Condition

<1:1.0-0.amzn2023
  • H
Use After Free

<1:1.0-0.amzn2023
  • H
Multiple Locks of a Critical Resource

<1:1.0-0.amzn2023
  • H
Race Condition

<1:1.0-0.amzn2023
  • H
CVE-2025-71266

<1:1.0-0.amzn2023
  • H
CVE-2024-14027

<1:1.0-0.amzn2023
  • H
Incorrect Pointer Scaling

<1:1.0-0.amzn2023
  • H
Detection of Error Condition Without Action

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Improper Update of Reference Count

<1:1.0-0.amzn2023
  • H
Access of Uninitialized Pointer

<1:1.0-0.amzn2023
  • H
Race Condition

<1:1.0-0.amzn2023
  • H
NULL Pointer Dereference

<1:1.0-0.amzn2023
  • H
Incorrect Calculation of Buffer Size

<1:1.0-0.amzn2023