kernel-livepatch-4_12_14-150_47-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-4_12_14-150_47-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<1-1.3.2
  • L
Use After Free

<1-1.3.2
  • M
Race Condition

<1-1.3.2
  • L
Missing Initialization of Resource

<1-1.3.2
  • M
Use of Uninitialized Resource

<1-1.3.2
  • L
Missing Initialization of Resource

<1-1.3.2
  • L
Missing Release of Resource after Effective Lifetime

<1-1.3.2
  • M
Out-of-bounds Write

<1-1.3.2
  • L
Use After Free

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • L
Use After Free

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • M
Information Exposure

<1-1.3.2
  • M
Out-of-bounds Write

<1-1.3.2
  • M
NULL Pointer Dereference

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • L
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • H
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • L
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • M
Memory Leak

<1-1.3.2
  • L
Integer Overflow or Wraparound

<1-1.3.2
  • M
Race Condition

<1-1.3.2
  • M
Information Exposure

<1-1.3.2
  • L
Missing Authorization

<1-1.3.2
  • L
NULL Pointer Dereference

<1-1.3.2
  • L
Memory Leak

<1-1.3.2
  • M
Use After Free

<1-1.3.2
  • H
Heap-based Buffer Overflow

<1-1.3.2
  • H
Heap-based Buffer Overflow

<1-1.3.2
  • H
Heap-based Buffer Overflow

<2-2.1
  • H
Stack-based Buffer Overflow

<2-2.1
  • H
Cleartext Transmission of Sensitive Information

<3-2.1
  • H
Improper Authentication

<3-2.1
  • H
Out-of-bounds Write

<4-2.1
  • H
Out-of-bounds Write

<4-2.1
  • H
Out-of-Bounds

<5-2.1
  • H
Out-of-Bounds

<5-2.1
  • H
Missing Authorization

<6-2.2
  • H
Heap-based Buffer Overflow

<6-2.2
  • M
Race Condition

<6-2.2
  • H
Out-of-bounds Write

<6-2.2
  • H
Buffer Overflow

<6-2.2
  • H
Use After Free

<6-2.2
  • H
NULL Pointer Dereference

<6-2.2
  • H
Incorrect Permission Assignment for Critical Resource

<7-2.2
  • H
Out-of-bounds Write

<7-2.2
  • H
Time-of-check Time-of-use (TOCTOU)

<7-2.2
  • H
Use After Free

<7-2.2
  • H
Out-of-bounds Write

<7-2.2
  • H
Improper Input Validation

<8-2.2
  • H
Cleartext Transmission of Sensitive Information

<8-2.2
  • H
Out-of-bounds Read

<8-2.2
  • M
CVE-2020-8694

<9-2.2
  • M
Improper Synchronization

<9-2.2
  • H
Use of Insufficiently Random Values

<9-2.2