kernel-64k vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-64k package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2024-27393

*
  • M
CVE-2024-27399

*
  • M
CVE-2024-27398

*
  • M
CVE-2024-27397

*
  • M
CVE-2024-27401

*
  • M
CVE-2024-27395

*
  • M
CVE-2024-21823

*
  • M
CVE-2023-52656

*
  • M
CVE-2023-52654

*
  • L
CVE-2024-27043

*
  • M
CVE-2024-26974

*
  • M
CVE-2022-48702

*
  • M
CVE-2022-48691

*
  • M
CVE-2022-48694

*
  • M
CVE-2022-48696

*
  • M
CVE-2022-48687

*
  • M
CVE-2022-48704

*
  • M
CVE-2022-48689

*
  • M
CVE-2022-48686

*
  • M
CVE-2022-48671

*
  • M
CVE-2022-48705

*
  • M
CVE-2022-48703

*
  • M
CVE-2022-48675

*
  • M
CVE-2022-48670

*
  • M
CVE-2022-48672

*
  • M
CVE-2022-48695

*
  • M
CVE-2022-48697

*
  • M
CVE-2022-48673

*
  • M
CVE-2022-48701

*
  • M
CVE-2022-48692

*
  • M
CVE-2022-48690

*
  • M
CVE-2022-48693

*
  • M
CVE-2022-48688

*
  • M
CVE-2024-27057

*
  • M
CVE-2024-27073

*
  • M
CVE-2024-27390

*
  • M
CVE-2024-27077

*
  • M
CVE-2024-27019

*
  • M
CVE-2024-27003

*
  • M
CVE-2024-27030

*
  • M
CVE-2024-27011

*
  • M
CVE-2024-27038

*
  • M
CVE-2024-27017

*
  • M
CVE-2024-27020

*
  • M
CVE-2024-27047

*
  • M
CVE-2024-27026

*
  • M
CVE-2024-27389

*
  • M
CVE-2024-26993

*
  • M
CVE-2024-27052

*
  • M
CVE-2024-27010

*
  • M
CVE-2024-27049

*
  • M
CVE-2024-26991

*
  • M
CVE-2024-27065

*
  • M
CVE-2024-27388

*
  • M
CVE-2024-27048

*
  • M
CVE-2024-27004

*
  • M
CVE-2024-27056

*
  • M
CVE-2024-27042

*
  • M
CVE-2024-26976

*
  • M
CVE-2024-27027

*
  • M
CVE-2024-26947

*
  • M
CVE-2024-27016

*
  • M
CVE-2024-27014

*
  • M
CVE-2024-26989

*
  • M
CVE-2024-26934

*
  • M
CVE-2024-27025

*
  • M
CVE-2024-27031

*
  • M
CVE-2024-27062

*
  • M
CVE-2024-26931

*
  • M
CVE-2024-26975

*
  • M
CVE-2024-27023

*
  • M
CVE-2024-27059

*
  • M
CVE-2024-27013

*
  • M
CVE-2024-26962

*
  • M
CVE-2024-26982

*
  • M
CVE-2024-26938

*
  • M
CVE-2024-27046

*
  • M
CVE-2024-27000

*
  • M
CVE-2024-26930

*
  • M
CVE-2024-26972

*
  • M
CVE-2024-26984

*
  • M
CVE-2024-27050

*
  • M
CVE-2024-27055

*
  • M
CVE-2024-27079

*
  • M
CVE-2024-26992

*
  • M
CVE-2024-27002

*
  • M
CVE-2024-26988

*
  • M
CVE-2024-27022

*
  • M
CVE-2024-27012

*
  • M
CVE-2024-26961

*
  • M
CVE-2024-26999

*
  • M
CVE-2024-26953

*
  • M
CVE-2024-26973

*
  • M
CVE-2024-26990

*
  • M
CVE-2024-26950

*
  • M
CVE-2024-26933

*
  • M
CVE-2024-26958

*
  • M
CVE-2024-27039

*
  • M
CVE-2024-26951

*
  • M
CVE-2024-26945

*
  • M
CVE-2024-26960

*
  • M
CVE-2024-26979

*
  • M
CVE-2024-26987

*
  • M
CVE-2024-27015

*
  • M
CVE-2024-26939

*
  • M
CVE-2024-26946

*
  • M
CVE-2024-26964

*
  • M
CVE-2024-26937

*
  • M
CVE-2024-26935

*
  • M
CVE-2024-26929

*
  • M
CVE-2024-26940

*
  • M
CVE-2023-52651

*
  • M
CVE-2023-52650

*
  • M
CVE-2023-52653

*
  • M
CVE-2023-52649

*
  • M
CVE-2023-52648

*
  • M
CVE-2022-48669

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • L
Race Condition

*
  • M
Deadlock

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
CVE-2024-26927

*
  • M
CVE-2023-52646

*
  • M
CVE-2022-48643

*
  • M
CVE-2022-48660

*
  • M
CVE-2022-48651

*
  • M
CVE-2022-48662

*
  • M
CVE-2022-48666

*
  • M
CVE-2022-48657

*
  • M
CVE-2022-48663

*
  • M
CVE-2022-48654

*
  • M
CVE-2022-48653

*
  • M
CVE-2022-48652

*
  • M
CVE-2022-48641

*
  • M
CVE-2022-48659

*
  • M
CVE-2022-48648

*
  • M
CVE-2022-48658

*
  • M
CVE-2022-48650

*
  • M
CVE-2022-48646

*
  • M
CVE-2022-48644

*
  • M
CVE-2022-48647

*
  • M
CVE-2022-48638

*
  • M
CVE-2022-48649

*
  • M
CVE-2022-48642

*
  • M
CVE-2022-48631

*
  • M
CVE-2022-48632

*
  • M
CVE-2022-48640

*
  • M
CVE-2022-48637

*
  • M
CVE-2022-48639

*
  • M
CVE-2022-48635

*
  • M
Integer Underflow

*
  • M
Resource Leak

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Race Condition

*
  • M
Improper Locking

*
  • L
Improper Input Validation

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
CVE-2024-26921

*
  • M
CVE-2024-26919

*
  • M
Race Condition

*
  • M
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • M
CVE-2024-26915

*
  • M
Improper Input Validation

*
  • L
Incomplete Cleanup

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • L
Race Condition

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • L
Unchecked Return Value to NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
CVE-2024-26920

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
CVE-2024-26918

*
  • L
Race Condition

*
  • L
Improper Resource Locking

*
  • L
Data Element containing Pointer Item without Proper Copy Control Element

*
  • M
Stack-based Buffer Overflow

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • L
Improper Input Validation

*
  • L
Excessive Platform Resource Consumption within a Loop

*
  • M
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
CVE-2024-26782

*
  • M
CVE-2024-26786

*
  • M
CVE-2024-26783

*
  • L
Resource Injection

*
  • M
CVE-2024-26803

*
  • M
Use After Free

*
  • M
CVE-2024-26785

*
  • M
CVE-2024-26804

*
  • M
CVE-2024-26801

*
  • M
Improper Input Validation

*
  • L
Deadlock

*
  • M
Improper Handling of Values

*
  • L
Divide By Zero

*
  • M
Improper Handling of Values

*
  • M
Incomplete Cleanup

*
  • M
Race Condition

*
  • M
Improper Null Termination

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Divide By Zero

*
  • L
Deadlock

*
  • M
Race Condition

*
  • L
Unchecked Input for Loop Condition

*
  • M
Improper Null Termination

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Deadlock

*
  • M
Double Free

*
  • M
Race Condition

*
  • M
Deadlock

*
  • M
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
Divide By Zero

*
  • L
Resource Injection

*
  • M
Improper Input Validation

*
  • L
Improper Null Termination

*
  • L
Improper Input Validation

*
  • M
Improper Handling of Undefined Parameters

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Unchecked Input for Loop Condition

*
  • M
Improper Protection Against Physical Side Channels

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
Out-of-Bounds

*
  • L
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Integer Overflow or Wraparound

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Missing Lock Check

*
  • L
Improper Locking

*
  • M
Integer Underflow

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Improper Resource Locking

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • L
Missing Initialization of a Variable

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Missing Lock Check

*
  • M
Resource Injection

*
  • M
Deadlock

*
  • L
Stack-based Buffer Overflow

*
  • M
Unchecked Input for Loop Condition

*
  • L
Memory Leak

*
  • M
Use After Free

*
  • M
Return of Wrong Status Code

*
  • L
Improper Input Validation

*
  • M
Use of NullPointerException Catch to Detect NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • M
Deadlock

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Deadlock

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • M
Return of Stack Variable Address

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Resource Locking

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • L
Use of Uninitialized Variable

*
  • M
Use After Free

*
  • L
Double Free

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Improper Resource Locking

*
  • M
Resource Leak

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52520

*
  • M
CVE-2023-52575

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • M
Memory Leak

*
  • M
Resource Injection

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • L
Missing Encryption of Sensitive Data

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • M
Race Condition

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
CVE-2024-26615

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • M
Deadlock

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2021-47018

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Untrusted Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • M
Resource Leak

*
  • L
Stack-based Buffer Overflow

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • M
Range Error

*
  • M
Improper Input Validation

*
  • L
CVE-2021-46914

*
  • L
Missing Support for Integrity Check

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Unchecked Error Condition

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • L
CVE-2023-52474

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Range Error

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Untrusted Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52462

*
  • L
Use After Free

*
  • M
CVE-2023-52455

*
  • M
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-26581

*
  • M
Use After Free

*
  • M
Improper Authentication

*
  • M
Memory Leak

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
CVE-2024-25744

*
  • M
CVE-2024-25741

*
  • M
Stack-based Buffer Overflow

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Information Exposure

*
  • H
Integer Overflow or Wraparound

<0:5.14.0-284.11.1.el9_2
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Improper Handling of Values

*
  • M
Resource Leak

*
  • L
Information Exposure

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • H
Out-of-Bounds

<0:5.14.0-284.30.1.el9_2
  • L
Use After Free

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Improper Zeroization of Hardware Register

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • M
Information Exposure

*
  • H
Out-of-bounds Read

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Improper Resource Locking

<0:5.14.0-284.30.1.el9_2
  • M
Divide By Zero

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Sensitive Information Uncleared Before Release

*
  • M
Reachable Assertion

*
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
Execution with Unnecessary Privileges

<0:5.14.0-284.18.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
Exposure of Resource to Wrong Sphere

<0:5.14.0-284.11.1.el9_2
  • M
Improper Update of Reference Count

*
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-bounds Read

<0:5.14.0-284.18.1.el9_2
  • M
Use After Free

*
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.25.1.el9_2
  • M
Use After Free

*
  • H
Interpretation Conflict

<0:5.14.0-284.11.1.el9_2
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.30.1.el9_2
  • M
Out-of-bounds Read

*
  • L
Improper Initialization

*
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • M
CVE-2022-27672

*
  • M
Use After Free

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • L
Externally Controlled Reference to a Resource in Another Sphere

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Write-what-where Condition

<0:5.14.0-284.11.1.el9_2
  • L
Use After Free

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Insecure Default Initialization of Resource

<0:5.14.0-284.11.1.el9_2
  • L
Memory Leak

*
  • H
Non-exit on Failed Initialization

<0:5.14.0-284.11.1.el9_2
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • H
Memory Leak

<0:5.14.0-284.11.1.el9_2
  • L
Memory Leak

*
  • L
Memory Leak

*
  • H
Race Condition

<0:5.14.0-284.25.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • H
Memory Leak

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • M
Race Condition

*
  • M
Improper Locking

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition During Access to Alternate Channel

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Authentication Bypass by Primary Weakness

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • L
Expected Behavior Violation

*
  • H
Incorrect Control Flow Scoping

<0:5.14.0-284.11.1.el9_2
  • H
Improper Input Validation

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • M
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • M
Out-of-bounds Read

*
  • H
Expected Behavior Violation

<0:5.14.0-284.11.1.el9_2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • L
Out-of-bounds Read

*
  • H
Improper Update of Reference Count

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Incomplete Cleanup

<0:5.14.0-284.11.1.el9_2
  • M
Out-of-bounds Write

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Race Condition

*
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • M
Improper Preservation of Permissions

*
  • L
Buffer Overflow

*
  • M
Memory Leak

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Out-of-Bounds

*
  • M
Race Condition

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • M
Out-of-Bounds

*
  • M
Insufficient Comparison

*
  • L
Information Exposure

*
  • M
Use After Free

*
  • M
Improper Initialization

*
  • L
Incorrect Authorization

*
  • M
Information Exposure

*
  • L
Improper Cleanup on Thrown Exception

*
  • M
Authentication Bypass

*
  • L
Incorrect Check of Function Return Value

*