kernel-livepatch-5_3_18-150200_24_139-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_3_18-150200_24_139-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<11-150200.2.2
  • H
Incorrect Calculation

<11-150200.2.2
  • H
Out-of-bounds Write

<9-150200.2.2
  • H
Use After Free

<9-150200.2.2
  • M
Use After Free

<9-150200.2.2
  • H
Use After Free

<9-150200.2.2
  • M
Use After Free

<9-150200.2.2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<6-150200.2.2
  • M
Out-of-bounds Write

<6-150200.2.2
  • H
CVE-2023-1390

<6-150200.2.2
  • H
NULL Pointer Dereference

<6-150200.2.2
  • H
Double Free

<6-150200.2.2
  • H
Double Free

<5-150200.2.3
  • H
Use After Free

<5-150200.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<5-150200.2.3
  • H
Use After Free

<5-150200.2.3
  • M
Use After Free

<5-150200.2.3
  • H
Use After Free

<5-150200.2.3
  • H
Use After Free

<5-150200.2.3
  • M
Use After Free

<4-150200.2.2
  • H
Use After Free

<4-150200.2.2
  • M
Double Free

<3-150200.2.3
  • H
Use After Free

<3-150200.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<3-150200.2.3
  • H
Race Condition

<2-150200.2.1
  • M
Integer Overflow or Wraparound

<1-150200.5.5.1
  • H
Allocation of Resources Without Limits or Throttling

<1-150200.5.5.1
  • M
Out-of-bounds Write

<1-150200.5.5.1
  • H
Out-of-bounds Write

<1-150200.5.5.1
  • M
NULL Pointer Dereference

<1-150200.5.5.1
  • M
Access of Uninitialized Pointer

<1-150200.5.5.1
  • M
Use After Free

<1-150200.5.5.1
  • L
Race Condition

<1-150200.5.5.1
  • H
Use After Free

<1-150200.5.5.1
  • M
Memory Leak

<1-150200.5.5.1
  • M
Improper Locking

<1-150200.5.5.1
  • H
Use After Free

<1-150200.5.5.1
  • M
Race Condition

<1-150200.5.5.1
  • M
Use of Uninitialized Resource

<1-150200.5.5.1
  • M
CVE-2022-39189

<1-150200.5.5.1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<1-150200.5.5.1
  • L
Out-of-Bounds

<1-150200.5.5.1
  • M
Double Free

<1-150200.5.5.1
  • L
Improper Resource Shutdown or Release

<1-150200.5.5.1
  • H
Race Condition

<1-150200.5.5.1
  • L
Memory Leak

<1-150200.5.5.1
  • M
Buffer Overflow

<1-150200.5.5.1
  • M
Out-of-Bounds

<1-150200.5.5.1
  • M
Improper Resource Shutdown or Release

<1-150200.5.5.1
  • M
Improper Resource Shutdown or Release

<1-150200.5.5.1
  • M
Use After Free

<1-150200.5.5.1
  • M
Out-of-bounds Write

<1-150200.5.5.1
  • M
Race Condition

<1-150200.5.5.1
  • H
Improper Synchronization

<1-150200.5.5.1
  • H
Out-of-Bounds

<1-150200.5.5.1
  • M
Improper Resource Shutdown or Release

<1-150200.5.5.1
  • L
Improper Resource Shutdown or Release

<1-150200.5.5.1
  • M
Improper Resource Shutdown or Release

<1-150200.5.5.1
  • M
Race Condition

<1-150200.5.5.1
  • M
Use After Free

<1-150200.5.5.1
  • M
Improper Input Validation

<1-150200.5.5.1
  • H
Use After Free

<1-150200.5.5.1
  • M
Use After Free

<1-150200.5.5.1
  • H
Out-of-Bounds

<1-150200.5.5.1
  • L
CVE-2022-28748

<1-150200.5.5.1
  • M
CVE-2022-28693

<1-150200.5.5.1
  • H
Use After Free

<1-150200.5.5.1
  • M
NULL Pointer Dereference

<1-150200.5.5.1
  • M
Improper Access Control

<1-150200.5.5.1