kernel-livepatch-5_3_18-150200_24_183-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_3_18-150200_24_183-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Memory Leak

<10-150200.5.6.1
  • H
CVE-2024-35864

<10-150200.5.6.1
  • H
CVE-2024-35862

<10-150200.5.6.1
  • H
CVE-2024-26828

<10-150200.5.6.1
  • H
CVE-2022-48651

<10-150200.5.6.1
  • M
Use After Free

<10-150200.5.6.1
  • H
Integer Overflow or Wraparound

<10-150200.5.6.1
  • H
Use of Uninitialized Resource

<10-150200.5.6.1
  • H
Use After Free

<10-150200.5.6.1
  • H
Use After Free

<10-150200.5.6.1
  • H
CVE-2021-47378

<10-150200.5.6.1
  • H
CVE-2024-36964

<10-150200.5.6.1
  • H
CVE-2021-47383

<10-150200.5.6.1
  • M
CVE-2024-36904

<10-150200.5.6.1
  • M
CVE-2024-35950

<10-150200.5.6.1
  • H
CVE-2024-27398

<10-150200.5.6.1
  • H
Race Condition

<10-150200.5.6.1
  • H
CVE-2024-26852

<10-150200.5.6.1
  • H
CVE-2024-35861

<10-150200.5.6.1
  • H
CVE-2021-47291

<10-150200.5.6.1
  • M
CVE-2024-26923

<10-150200.5.6.1
  • M
Race Condition

<10-150200.5.6.1
  • H
Use After Free

<10-150200.5.6.1
  • H
Out-of-bounds Read

<10-150200.5.6.1
  • M
CVE-2021-47402

<10-150200.5.6.1
  • H
CVE-2024-36964

<9-150200.5.6.1
  • M
CVE-2024-35950

<9-150200.5.6.1
  • H
Use After Free

<9-150200.5.6.1
  • H
CVE-2024-35862

<9-150200.5.6.1
  • H
CVE-2024-35864

<9-150200.5.6.1
  • H
CVE-2021-47383

<9-150200.5.6.1
  • H
Use After Free

<9-150200.5.6.1
  • H
Use After Free

<9-150200.5.6.1
  • M
CVE-2021-47402

<9-150200.5.6.1
  • H
CVE-2021-47378

<9-150200.5.6.1
  • M
Race Condition

<9-150200.5.6.1
  • H
Race Condition

<9-150200.5.6.1
  • H
Integer Overflow or Wraparound

<9-150200.5.6.1
  • H
CVE-2024-26828

<9-150200.5.6.1
  • H
CVE-2022-48651

<9-150200.5.6.1
  • M
Use After Free

<9-150200.5.6.1
  • H
Use of Uninitialized Resource

<9-150200.5.6.1
  • H
CVE-2024-35861

<9-150200.5.6.1
  • H
CVE-2024-27398

<9-150200.5.6.1
  • M
CVE-2024-26923

<9-150200.5.6.1
  • H
CVE-2021-47291

<9-150200.5.6.1
  • H
Out-of-bounds Read

<9-150200.5.6.1
  • H
CVE-2024-26852

<9-150200.5.6.1
  • M
Race Condition

<8-150200.5.6.1
  • H
CVE-2021-47383

<8-150200.5.6.1
  • M
CVE-2024-26923

<8-150200.5.6.1
  • H
CVE-2024-36964

<8-150200.5.6.1
  • H
CVE-2024-26828

<8-150200.5.6.1
  • H
CVE-2022-48651

<8-150200.5.6.1
  • H
CVE-2024-27398

<8-150200.5.6.1
  • H
Race Condition

<8-150200.5.6.1
  • H
Use of Uninitialized Resource

<8-150200.5.6.1
  • H
Integer Overflow or Wraparound

<8-150200.5.6.1
  • M
CVE-2024-35950

<8-150200.5.6.1
  • H
CVE-2021-47378

<8-150200.5.6.1
  • H
CVE-2024-26852

<8-150200.5.6.1
  • H
Use After Free

<8-150200.5.6.1
  • H
CVE-2021-47291

<8-150200.5.6.1
  • H
CVE-2024-35861

<8-150200.5.6.1
  • H
Out-of-bounds Read

<8-150200.5.6.1
  • M
CVE-2021-47402

<8-150200.5.6.1
  • H
CVE-2024-26828

<7-150200.5.6.1
  • H
Use After Free

<7-150200.5.6.1
  • H
Integer Overflow or Wraparound

<7-150200.5.6.1
  • M
CVE-2021-47383

<7-150200.5.6.1
  • M
CVE-2024-35950

<7-150200.5.6.1
  • M
Race Condition

<7-150200.5.6.1
  • M
CVE-2024-26852

<7-150200.5.6.1
  • M
CVE-2021-47402

<7-150200.5.6.1
  • H
CVE-2024-26923

<7-150200.5.6.1
  • H
CVE-2021-47378

<7-150200.5.6.1
  • H
CVE-2024-27398

<7-150200.5.6.1
  • H
Out-of-bounds Read

<7-150200.5.6.1
  • H
CVE-2022-48651

<7-150200.5.6.1
  • H
Race Condition

<7-150200.5.6.1
  • H
CVE-2024-26923

<6-150200.5.6.1
  • M
Race Condition

<6-150200.5.6.1
  • M
CVE-2024-35950

<6-150200.5.6.1
  • M
CVE-2021-47383

<6-150200.5.6.1
  • H
Race Condition

<6-150200.5.6.1
  • H
CVE-2024-27398

<6-150200.5.6.1
  • H
CVE-2022-48651

<6-150200.5.6.1
  • H
CVE-2024-26828

<6-150200.5.6.1
  • H
Integer Overflow or Wraparound

<6-150200.5.6.1
  • H
Use After Free

<6-150200.5.6.1
  • H
Out-of-bounds Read

<6-150200.5.6.1
  • M
CVE-2024-26852

<6-150200.5.6.1
  • H
Out-of-bounds Read

<5-150200.5.6.1
  • H
CVE-2024-26923

<5-150200.5.6.1
  • H
Integer Overflow or Wraparound

<5-150200.5.6.1
  • M
CVE-2024-26852

<5-150200.5.6.1
  • H
CVE-2022-48651

<5-150200.5.6.1
  • M
Race Condition

<5-150200.5.6.1
  • M
CVE-2021-47383

<5-150200.5.6.1
  • H
CVE-2024-26828

<5-150200.5.6.1
  • H
Race Condition

<5-150200.5.6.1
  • H
Use After Free

<5-150200.5.6.1
  • H
CVE-2022-48651

<4-150200.5.6.2
  • H
Use After Free

<4-150200.5.6.2
  • H
Out-of-bounds Read

<4-150200.5.6.2
  • H
Race Condition

<4-150200.5.6.2
  • M
Race Condition

<4-150200.5.6.2
  • M
CVE-2024-26852

<4-150200.5.6.2
  • H
Use After Free

<3-150200.5.6.1
  • H
CVE-2022-48651

<3-150200.5.6.1
  • H
Race Condition

<3-150200.5.6.1
  • M
Race Condition

<3-150200.5.6.1
  • M
Race Condition

<2-150200.5.6.1
  • H
Use After Free

<2-150200.5.6.1
  • M
CVE-2024-26607

<1-150200.5.3.2
  • M
Out-of-Bounds

<1-150200.5.3.2
  • M
CVE-2024-26602

<1-150200.5.3.2
  • H
Use After Free

<1-150200.5.3.2
  • M
Race Condition

<1-150200.5.3.2
  • M
Out-of-bounds Write

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
Off-by-one Error

<1-150200.5.3.2
  • M
Out-of-bounds Read

<1-150200.5.3.2
  • L
CVE-2024-0340

<1-150200.5.3.2
  • M
CVE-2024-23851

<1-150200.5.3.2
  • M
CVE-2023-52597

<1-150200.5.3.2
  • M
Out-of-bounds Write

<1-150200.5.3.2
  • M
CVE-2024-0607

<1-150200.5.3.2
  • M
CVE-2023-52605

<1-150200.5.3.2
  • M
CVE-2023-52569

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
CVE-2023-52532

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
Out-of-bounds Write

<1-150200.5.3.2
  • M
CVE-2023-52502

<1-150200.5.3.2
  • M
CVE-2023-52482

<1-150200.5.3.2
  • M
CVE-2023-52478

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
Improper Validation of Array Index

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
Double Free

<1-150200.5.3.2
  • M
Improper Check for Unusual or Exceptional Conditions

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • H
CVE-2023-52340

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
Race Condition

<1-150200.5.3.2
  • M
CVE-2022-48627

<1-150200.5.3.2
  • M
CVE-2023-28746

<1-150200.5.3.2
  • M
Race Condition

<1-150200.5.3.2
  • M
CVE-2021-47078

<1-150200.5.3.2
  • M
CVE-2021-47083

<1-150200.5.3.2
  • M
CVE-2021-47076

<1-150200.5.3.2
  • M
CVE-2021-47069

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • L
CVE-2021-47054

<1-150200.5.3.2
  • M
CVE-2021-47060

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • M
CVE-2021-46989

<1-150200.5.3.2
  • M
CVE-2021-46974

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2
  • M
CVE-2021-46964

<1-150200.5.3.2
  • M
CVE-2021-46953

<1-150200.5.3.2
  • L
Improper Check for Unusual or Exceptional Conditions

<1-150200.5.3.2
  • L
Improper Initialization

<1-150200.5.3.2
  • H
Use After Free

<1-150200.5.3.2
  • M
Memory Leak

<1-150200.5.3.2
  • M
Divide By Zero

<1-150200.5.3.2
  • M
Exposure of Resource to Wrong Sphere

<1-150200.5.3.2
  • L
NULL Pointer Dereference

<1-150200.5.3.2
  • L
CVE-2020-36784

<1-150200.5.3.2
  • M
NULL Pointer Dereference

<1-150200.5.3.2
  • L
Memory Leak

<1-150200.5.3.2
  • M
Use After Free

<1-150200.5.3.2