kpatch-patch-3_10_0-1062_1_1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kpatch-patch-3_10_0-1062_1_1 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Out-of-Bounds

<0:1-4.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Buffer Overflow

<0:1-1.el7
  • H
Use After Free

<0:1-10.el7
  • H
Out-of-bounds Write

<0:1-10.el7
  • H
Use After Free

<0:1-10.el7
  • H
Use After Free

<0:1-10.el7
  • H
Use After Free

<0:1-10.el7
  • H
Use After Free

<0:1-10.el7
  • H
Use After Free

<0:1-10.el7
  • H
Out-of-Bounds

<0:1-4.el7
  • H
Out-of-Bounds

<0:1-4.el7
  • H
Out-of-Bounds

<0:1-4.el7
  • H
Out-of-Bounds

<0:1-4.el7
  • H
Out-of-Bounds

<0:1-4.el7
  • H
NULL Pointer Dereference

<0:1-17.el7
  • H
NULL Pointer Dereference

<0:1-17.el7
  • H
NULL Pointer Dereference

<0:1-17.el7
  • H
NULL Pointer Dereference

<0:1-17.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Sensitive Information Uncleared Before Release

<0:1-8.el7
  • H
Use After Free

<0:1-17.el7
  • H
Use After Free

<0:1-17.el7
  • H
Use After Free

<0:1-17.el7
  • H
Use After Free

<0:1-17.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1-4.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1-4.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1-4.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1-4.el7
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Out-of-bounds Write

<0:1-10.el7
  • H
Out-of-bounds Write

<0:1-10.el7
  • H
Out-of-bounds Write

<0:1-10.el7
  • H
Out-of-bounds Write

<0:1-10.el7
  • H
Out-of-bounds Write

<0:1-10.el7
  • H
Buffer Overflow

<0:1-1.el7
  • H
Buffer Overflow

<0:1-1.el7
  • H
Buffer Overflow

<0:1-1.el7
  • H
Buffer Overflow

<0:1-1.el7
  • H
Buffer Overflow

<0:1-1.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7
  • H
Heap-based Buffer Overflow

<0:1-4.el7