kernel-livepatch-4_12_14-150_52-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-4_12_14-150_52-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

<1-1.5.1
  • L
Resource Exhaustion

<1-1.5.1
  • H
Race Condition

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • L
Information Exposure

<1-1.5.1
  • L
Out-of-bounds Read

<1-1.5.1
  • L
Improper Synchronization

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • L
Memory Leak

<1-1.5.1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<1-1.5.1
  • H
Out-of-bounds Write

<1-1.5.1
  • H
Out-of-bounds Write

<1-1.5.1
  • M
Race Condition

<1-1.5.1
  • L
Use After Free

<1-1.5.1
  • M
Race Condition

<1-1.5.1
  • M
CVE-2020-11669

<1-1.5.1
  • M
NULL Pointer Dereference

<1-1.5.1
  • M
NULL Pointer Dereference

<1-1.5.1
  • M
Use of Uninitialized Resource

<1-1.5.1
  • M
Out-of-bounds Write

<1-1.5.1
  • H
Out-of-Bounds

<1-1.5.1
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1-1.5.1
  • L
Use of Uninitialized Resource

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
NULL Pointer Dereference

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
Incomplete Cleanup

<1-1.5.1
  • M
Race Condition

<1-1.5.1
  • M
Information Exposure

<1-1.5.1
  • M
Out-of-bounds Write

<1-1.5.1
  • M
Resource Exhaustion

<1-1.5.1
  • L
Memory Leak

<1-1.5.1
  • M
Memory Leak

<1-1.5.1
  • H
Memory Leak

<1-1.5.1
  • M
NULL Pointer Dereference

<1-1.5.1
  • L
Use After Free

<1-1.5.1
  • M
NULL Pointer Dereference

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • H
Use After Free

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • L
NULL Pointer Dereference

<1-1.5.1
  • M
Use After Free

<1-1.5.1
  • M
Memory Leak

<1-1.5.1
  • M
Memory Leak

<1-1.5.1
  • M
NULL Pointer Dereference

<1-1.5.1
  • M
Memory Leak

<1-1.5.1
  • H
Stack-based Buffer Overflow

<1-1.5.1
  • H
Heap-based Buffer Overflow

<1-1.5.1
  • M
CVE-2019-14615

<1-1.5.1
  • H
Out-of-Bounds

<1-1.5.1
  • H
Missing Authorization

<2-2.2
  • H
NULL Pointer Dereference

<2-2.2
  • H
Cleartext Transmission of Sensitive Information

<2-2.2
  • H
Buffer Overflow

<2-2.2
  • H
Out-of-bounds Write

<2-2.2
  • H
Incorrect Permission Assignment for Critical Resource

<3-2.2
  • H
Out-of-bounds Write

<3-2.2
  • H
Time-of-check Time-of-use (TOCTOU)

<3-2.2
  • H
Use After Free

<3-2.2
  • H
Out-of-bounds Write

<3-2.2
  • H
Improper Input Validation

<4-2.2
  • H
Cleartext Transmission of Sensitive Information

<4-2.2
  • H
Out-of-bounds Read

<4-2.2
  • M
CVE-2020-8694

<5-2.2
  • M
Improper Synchronization

<5-2.2
  • H
Use of Insufficiently Random Values

<5-2.2
  • H
Use After Free

<6-2.2
  • H
Buffer Overflow

<6-2.2
  • H
Out-of-bounds Write

<6-2.2
  • H
Use After Free

<6-2.2
  • H
Use After Free

<6-2.2
  • M
Race Condition

<6-2.2
  • H
Use After Free

<6-2.2
  • H
Use After Free

<7-2.2
  • M
Race Condition

<7-2.2
  • H
Directory Traversal

<7-2.2
  • H
Use After Free

<7-2.2
  • H
CVE-2021-27363

<8-2.2
  • M
Out-of-bounds Write

<8-2.2
  • H
Out-of-bounds Read

<8-2.2
  • M
Improper Initialization

<9-2.2
  • M
Allocation of Resources Without Limits or Throttling

<9-2.2
  • M
Out-of-bounds Read

<9-2.2
  • H
CVE-2021-26930

<9-2.2
  • H
Incomplete Cleanup

<10-2.2
  • H
Use After Free

<10-2.2
  • M
Arbitrary Command Injection

<10-2.2
  • H
Race Condition

<11-2.2
  • H
Use After Free

<11-2.2