kernel-livepatch-5_3_18-24_99-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_3_18-24_99-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<18-150200.2.2
  • H
Use After Free

<18-150200.2.2
  • H
Out-of-bounds Write

<17-150200.2.2
  • H
Allocation of Resources Without Limits or Throttling

<17-150200.2.2
  • M
Out-of-bounds Write

<17-150200.2.2
  • M
Memory Leak

<17-150200.2.2
  • H
Use After Free

<17-150200.2.2
  • M
Use After Free

<17-150200.2.2
  • H
Out-of-Bounds

<17-150200.2.2
  • H
Out-of-Bounds

<17-150200.2.2
  • H
Use After Free

<16-150200.2.2
  • H
Double Free

<16-150200.2.2
  • H
Out-of-bounds Write

<16-150200.2.2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<15-150200.2.2
  • H
Use After Free

<15-150200.2.2
  • H
Out-of-bounds Write

<15-150200.2.2
  • M
Use After Free

<15-150200.2.2
  • H
Use After Free

<15-150200.2.2
  • M
CVE-2022-39189

<15-150200.2.2
  • M
Race Condition

<14-150200.2.2
  • H
CVE-2022-29581

<14-150200.2.2
  • M
Use After Free

<14-150200.2.2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<13-150200.2.2
  • H
CVE-2022-36946

<13-150200.2.2
  • M
Race Condition

<12-150200.2.2
  • M
Use After Free

<12-150200.2.2
  • M
Double Free

<12-150200.2.2
  • M
Double Free

<12-150200.2.2
  • H
Buffer Overflow

<12-150200.2.2
  • M
Race Condition

<11-150200.2.3
  • H
Out-of-bounds Write

<11-150200.2.3
  • H
Race Condition

<11-150200.2.3
  • H
Integer Overflow or Wraparound

<10-150200.2.2
  • H
Use After Free

<10-150200.2.2
  • H
Use After Free

<10-150200.2.2
  • H
Use After Free

<10-150200.2.2
  • H
Missing Authorization

<9-150200.2.2
  • H
Race Condition

<9-150200.2.2
  • M
Use After Free

<8-150200.2.1
  • H
Use After Free

<7-150200.2.1
  • M
Improper Preservation of Permissions

<7-150200.2.1
  • H
Use After Free

<6-150200.2.1
  • H
Missing Initialization of Resource

<6-150200.2.1
  • M
Use After Free

<6-150200.2.1
  • H
Use After Free

<5-150200.2.1
  • H
Out-of-bounds Write

<5-150200.2.1
  • M
Use After Free

<5-150200.2.1
  • M
Incorrect Type Conversion or Cast

<1-5.3.1
  • H
Integer Underflow

<1-5.3.1
  • L
Use of a Broken or Risky Cryptographic Algorithm

<1-5.3.1
  • L
Use of a Broken or Risky Cryptographic Algorithm

<1-5.3.1
  • M
Race Condition

<1-5.3.1
  • M
CVE-2021-43976

<1-5.3.1
  • M
Out-of-bounds Write

<1-5.3.1
  • M
Race Condition

<1-5.3.1
  • M
Improper Authentication

<1-5.3.1
  • M
Improper Locking

<1-5.3.1
  • M
Memory Leak

<1-5.3.1
  • H
Race Condition

<1-5.3.1
  • M
Memory Leak

<1-5.3.1
  • H
Time-of-check Time-of-use (TOCTOU)

<1-5.3.1
  • M
Improper Input Validation

<1-5.3.1
  • M
Allocation of Resources Without Limits or Throttling

<1-5.3.1
  • M
Allocation of Resources Without Limits or Throttling

<1-5.3.1
  • M
CVE-2021-28713

<1-5.3.1
  • M
CVE-2021-28712

<1-5.3.1
  • M
CVE-2021-28711

<1-5.3.1
  • H
Race Condition

<1-5.3.1
  • L
Use After Free

<1-5.3.1
  • H
Out-of-bounds Write

<2-2.2
  • H
Double Free

<3-2.1
  • H
CVE-2022-0516

<3-2.1
  • H
Race Condition

<3-2.1
  • M
Missing Authorization

<4-150200.2.1