kernel-livepatch-5_14_21-150400_24_60-default vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-livepatch-5_14_21-150400_24_60-default package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2023-0386

<2-150400.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2-150400.2.3
  • M
Use After Free

<2-150400.2.3
  • M
Race Condition

<11-150400.2.3
  • M
CVE-2023-51779

<11-150400.2.3
  • M
CVE-2023-46813

<11-150400.2.3
  • H
Use After Free

<8-150400.2.1
  • H
Use After Free

<8-150400.2.1
  • H
Use After Free

<8-150400.2.1
  • M
Use After Free

<8-150400.2.1
  • H
Incorrect Calculation

<8-150400.2.1
  • H
Reachable Assertion

<5-150400.2.1
  • H
Out-of-bounds Write

<5-150400.2.1
  • H
Out-of-bounds Read

<5-150400.2.1
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<5-150400.2.1
  • H
Out-of-bounds Write

<5-150400.2.1
  • H
Use After Free

<5-150400.2.1
  • M
Out-of-bounds Write

<3-150400.2.2
  • H
CVE-2023-0386

<2-150400.2.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<2-150400.2.3
  • M
Use After Free

<2-150400.2.3
  • H
NULL Pointer Dereference

<1-150400.9.3.2
  • H
Double Free

<1-150400.9.3.2
  • L
NULL Pointer Dereference

<1-150400.9.3.2
  • M
NULL Pointer Dereference

<1-150400.9.3.2
  • M
Use After Free

<1-150400.9.3.2
  • M
Use After Free

<1-150400.9.3.2
  • M
Improper Cross-boundary Removal of Sensitive Data

<1-150400.9.3.2
  • M
Use After Free

<1-150400.9.3.2
  • M
Race Condition

<1-150400.9.3.2
  • L
Improper Initialization

<1-150400.9.3.2
  • H
Use After Free

<1-150400.9.3.2
  • M
NULL Pointer Dereference

<1-150400.9.3.2
  • H
Double Free

<1-150400.9.3.2
  • H
Information Exposure

<1-150400.9.3.2