kpatch-patch-4_18_0-193 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kpatch-patch-4_18_0-193 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Incorrect Calculation of Buffer Size

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Out-of-bounds Write

<0:1-7.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Expected Behavior Violation

<0:1-5.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
Use After Free

<0:1-3.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
NULL Pointer Dereference

<0:1-2.el8
  • H
Use After Free

<0:1-13.el8
  • H
Use After Free

<0:1-13.el8
  • H
Use After Free

<0:1-13.el8
  • H
Use After Free

<0:1-13.el8
  • H
Information Exposure

<0:1-13.el8
  • H
Information Exposure

<0:1-13.el8
  • H
Information Exposure

<0:1-13.el8
  • H
Information Exposure

<0:1-13.el8
  • H
Execution with Unnecessary Privileges

<0:1-13.el8
  • H
Execution with Unnecessary Privileges

<0:1-13.el8
  • H
Execution with Unnecessary Privileges

<0:1-13.el8
  • H
Execution with Unnecessary Privileges

<0:1-13.el8
  • H
Improper Locking

<0:1-10.el8
  • H
Improper Locking

<0:1-10.el8
  • H
Improper Locking

<0:1-10.el8
  • H
Improper Locking

<0:1-10.el8
  • H
Out-of-Bounds

<0:1-10.el8
  • H
Out-of-Bounds

<0:1-10.el8
  • H
Out-of-Bounds

<0:1-10.el8
  • H
Out-of-Bounds

<0:1-10.el8
  • H
Resource Injection

<0:1-10.el8
  • H
Resource Injection

<0:1-10.el8
  • H
Resource Injection

<0:1-10.el8
  • H
Resource Injection

<0:1-10.el8