kernel-livepatch-5_3_18-150300_59_174-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_3_18-150300_59_174-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Initialization

<1-150300.7.3.1
  • M
CVE-2024-43883

<1-150300.7.3.1
  • M
Time-of-check Time-of-use (TOCTOU)

<1-150300.7.3.1
  • H
Memory Leak

<1-150300.7.3.1
  • H
Use After Free

<1-150300.7.3.1
  • H
Use After Free

<1-150300.7.3.1
  • M
CVE-2024-42077

<1-150300.7.3.1
  • H
CVE-2024-41062

<1-150300.7.3.1
  • M
Improper Handling of Exceptional Conditions

<1-150300.7.3.1
  • H
Incorrect Calculation

<1-150300.7.3.1
  • M
Allocation of Resources Without Limits or Throttling

<1-150300.7.3.1
  • H
CVE-2024-40910

<1-150300.7.3.1
  • M
CVE-2023-52854

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Race Condition

<1-150300.7.3.1
  • M
Memory Leak

<1-150300.7.3.1
  • H
Out-of-bounds Read

<1-150300.7.3.1
  • M
Memory Leak

<1-150300.7.3.1
  • M
Memory Leak

<1-150300.7.3.1
  • M
Race Condition

<1-150300.7.3.1
  • M
Improper Locking

<1-150300.7.3.1
  • M
CVE-2022-48926

<1-150300.7.3.1
  • M
CVE-2022-48917

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • H
Double Free

<1-150300.7.3.1
  • H
Use After Free

<1-150300.7.3.1
  • L
Memory Leak

<1-150300.7.3.1
  • M
CVE-2022-48901

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Race Condition

<1-150300.7.3.1
  • M
Memory Leak

<1-150300.7.3.1
  • M
CVE-2022-48853

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
NULL Pointer Dereference

<1-150300.7.3.1
  • M
Out-of-bounds Read

<1-150300.7.3.1
  • M
Integer Overflow or Wraparound

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
CVE-2022-48836

<1-150300.7.3.1
  • M
Release of Invalid Pointer or Reference

<1-150300.7.3.1
  • L
CVE-2022-48834

<1-150300.7.3.1
  • M
CVE-2022-48827

<1-150300.7.3.1
  • M
NULL Pointer Dereference

<1-150300.7.3.1
  • L
CVE-2022-48823

<1-150300.7.3.1
  • M
CVE-2022-48811

<1-150300.7.3.1
  • M
CVE-2022-48805

<1-150300.7.3.1
  • M
CVE-2022-48802

<1-150300.7.3.1
  • M
CVE-2022-48798

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • M
Use After Free

<1-150300.7.3.1
  • L
CVE-2022-48778

<1-150300.7.3.1
  • L
Memory Leak

<1-150300.7.3.1
  • H
Use After Free

<1-150300.7.3.1
  • H
Out-of-Bounds

<1-150300.7.3.1
  • L
CVE-2022-28748

<1-150300.7.3.1
  • M
CVE-2022-20368

<1-150300.7.3.1
  • M
Memory Leak

<1-150300.7.3.1
  • M
NULL Pointer Dereference

<1-150300.7.3.1