kernel-livepatch-5_3_18-150300_59_71-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_3_18-150300_59_71-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<14-150300.2.3
  • M
Use After Free

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • H
Double Free

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • H
Double Free

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • M
Use After Free

<14-150300.2.3
  • H
Use After Free

<14-150300.2.3
  • M
Double Free

<12-150300.2.3
  • H
Use After Free

<12-150300.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<12-150300.2.3
  • H
Integer Overflow or Wraparound

<11-150300.2.1
  • H
Race Condition

<11-150300.2.1
  • M
Use After Free

<10-150300.2.1
  • H
Use After Free

<10-150300.2.1
  • M
Memory Leak

<9-150300.2.1
  • H
Allocation of Resources Without Limits or Throttling

<9-150300.2.1
  • H
Out-of-bounds Write

<9-150300.2.1
  • H
Use After Free

<9-150300.2.1
  • M
Out-of-bounds Write

<9-150300.2.1
  • M
Use After Free

<9-150300.2.1
  • H
Out-of-Bounds

<9-150300.2.1
  • H
NULL Pointer Dereference

<8-150300.2.1
  • H
Use After Free

<8-150300.2.1
  • H
Double Free

<8-150300.2.1
  • H
Out-of-bounds Write

<8-150300.2.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<7-150300.2.1
  • H
Use After Free

<7-150300.2.1
  • H
Out-of-bounds Write

<7-150300.2.1
  • M
Use After Free

<7-150300.2.1
  • H
Use After Free

<7-150300.2.1
  • M
CVE-2022-39189

<7-150300.2.1
  • M
Race Condition

<6-150300.2.2
  • H
CVE-2022-29581

<6-150300.2.2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<5-150300.2.1
  • H
CVE-2022-36946

<5-150300.2.1
  • M
Race Condition

<4-150300.2.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<4-150300.2.1
  • M
Use After Free

<4-150300.2.1
  • M
Race Condition

<3-150300.2.2
  • H
Use After Free

<3-150300.2.2
  • H
Integer Overflow or Wraparound

<2-150300.2.2
  • H
Use After Free

<2-150300.2.2
  • H
Use After Free

<2-150300.2.2
  • M
Incomplete Cleanup

<1-150300.7.3.2
  • H
Missing Authorization

<1-150300.7.3.2
  • M
Improper Input Validation

<1-150300.7.3.2
  • M
Incomplete Cleanup

<1-150300.7.3.2
  • M
Use of Uninitialized Resource

<1-150300.7.3.2
  • M
Incomplete Cleanup

<1-150300.7.3.2
  • M
Incomplete Cleanup

<1-150300.7.3.2
  • M
CVE-2022-1972

<1-150300.7.3.2
  • M
Use After Free

<1-150300.7.3.2
  • H
Race Condition

<1-150300.7.3.2
  • M
Use After Free

<1-150300.7.3.2
  • M
NULL Pointer Dereference

<1-150300.7.3.2
  • M
CVE-2021-33061

<1-150300.7.3.2
  • H
Use After Free

<1-150300.7.3.2