kernel-livepatch-5_3_18-150200_24_126-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_3_18-150200_24_126-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • H
Double Free

<11-150200.2.3
  • M
Use After Free

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • H
Out-of-bounds Write

<14-150200.2.2
  • H
Use After Free

<14-150200.2.2
  • H
Out-of-bounds Write

<14-150200.2.2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<14-150200.2.2
  • H
Use After Free

<14-150200.2.2
  • H
Out-of-bounds Read

<14-150200.2.2
  • H
Out-of-bounds Write

<13-150200.2.2
  • H
Use After Free

<13-150200.2.2
  • M
Incorrect Authorization

<13-150200.2.2
  • H
CVE-2023-1390

<12-150200.2.2
  • M
Out-of-bounds Write

<12-150200.2.2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<12-150200.2.2
  • H
Double Free

<12-150200.2.2
  • H
NULL Pointer Dereference

<12-150200.2.2
  • H
Double Free

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • M
Use After Free

<11-150200.2.3
  • H
Use After Free

<11-150200.2.3
  • M
Use After Free

<10-150200.2.2
  • H
Use After Free

<10-150200.2.2
  • H
Out-of-bounds Write

<10-150200.2.2
  • H
Use After Free

<7-150200.2.1
  • M
Use After Free

<7-150200.2.1
  • H
Out-of-bounds Write

<6-150200.2.1
  • M
Memory Leak

<6-150200.2.1
  • H
Allocation of Resources Without Limits or Throttling

<6-150200.2.1
  • H
Use After Free

<6-150200.2.1
  • H
Out-of-Bounds

<6-150200.2.1
  • M
Use After Free

<6-150200.2.1
  • M
Out-of-bounds Write

<6-150200.2.1
  • H
Use After Free

<5-150200.2.1
  • H
Double Free

<5-150200.2.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<4-150200.2.1
  • H
Use After Free

<4-150200.2.1
  • H
Out-of-bounds Write

<4-150200.2.1
  • M
Use After Free

<4-150200.2.1
  • H
Use After Free

<4-150200.2.1
  • M
CVE-2022-39189

<4-150200.2.1
  • H
CVE-2022-29581

<3-150200.2.2
  • H
Use After Free

<3-150200.2.2
  • M
Race Condition

<3-150200.2.2
  • H
Integer Overflow or Wraparound

<2-150200.2.1
  • H
Use of a Broken or Risky Cryptographic Algorithm

<2-150200.2.1
  • H
CVE-2022-36946

<1-150200.5.5.1
  • M
Use After Free

<1-150200.5.5.1
  • M
Exposure of Resource to Wrong Sphere

<1-150200.5.5.1
  • M
Improper Cross-boundary Removal of Sensitive Data

<1-150200.5.5.1
  • M
Information Exposure

<1-150200.5.5.1
  • M
Information Exposure

<1-150200.5.5.1
  • M
Improper Cross-boundary Removal of Sensitive Data

<1-150200.5.5.1
  • M
Memory Leak

<1-150200.5.5.1
  • M
Use After Free

<1-150200.5.5.1
  • M
CVE-2022-21505

<1-150200.5.5.1
  • M
Race Condition

<1-150200.5.5.1
  • M
Race Condition

<1-150200.5.5.1
  • M
Out-of-bounds Read

<1-150200.5.5.1
  • M
Use After Free

<1-150200.5.5.1
  • M
Race Condition

<1-150200.5.5.1
  • H
Integer Overflow or Wraparound

<1-150200.5.5.1
  • L
Out-of-Bounds

<1-150200.5.5.1
  • M
Out-of-bounds Write

<1-150200.5.5.1
  • H
Out-of-bounds Write

<1-150200.5.5.1
  • M
Improper Cross-boundary Removal of Sensitive Data

<1-150200.5.5.1
  • H
Race Condition

<1-150200.5.5.1
  • H
Race Condition

<1-150200.5.5.1