kernel-livepatch-5_3_18-150200_24_134-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_3_18-150200_24_134-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<12-150200.2.2
  • M
Use After Free

<12-150200.2.2
  • H
Use After Free

<12-150200.2.2
  • H
Out-of-bounds Write

<12-150200.2.2
  • M
Use After Free

<12-150200.2.2
  • H
Out-of-bounds Write

<10-150200.2.2
  • H
Use After Free

<10-150200.2.2
  • H
Incorrect Authorization

<10-150200.2.2
  • M
Double Free

<6-150200.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<6-150200.2.3
  • H
Use After Free

<6-150200.2.3
  • M
Use After Free

<4-150200.2.1
  • H
Use After Free

<4-150200.2.1
  • H
Out-of-bounds Write

<3-150200.2.1
  • H
Allocation of Resources Without Limits or Throttling

<3-150200.2.1
  • M
Use After Free

<3-150200.2.1
  • M
Memory Leak

<3-150200.2.1
  • M
Out-of-bounds Write

<3-150200.2.1
  • H
Out-of-Bounds

<3-150200.2.1
  • M
CVE-2022-39189

<2-150200.2.1
  • H
Use After Free

<2-150200.2.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1-150200.5.3.2
  • H
Use After Free

<1-150200.5.3.2
  • H
Use After Free

<1-150200.5.3.2
  • M
Race Condition

<1-150200.5.3.2
  • M
Race Condition

<1-150200.5.3.2
  • H
Out-of-bounds Write

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • H
Use After Free

<1-150200.5.3.2
  • M
Improper Locking

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
Use of Insufficiently Random Values

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
Improper Authentication

<1-150200.5.3.2
  • M
Use of Uninitialized Resource

<1-150200.5.3.2
  • H
Use After Free

<1-150200.5.3.2