kernel-64k-devel-matched vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-64k-devel-matched package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2024-27393

*
  • M
CVE-2024-27399

*
  • M
CVE-2024-27398

*
  • M
CVE-2024-27397

*
  • M
CVE-2024-27401

*
  • M
CVE-2024-27395

*
  • M
CVE-2024-21823

*
  • M
CVE-2023-52656

*
  • M
CVE-2023-52654

*
  • L
CVE-2024-27043

*
  • M
CVE-2024-26974

*
  • M
CVE-2022-48702

*
  • M
CVE-2022-48691

*
  • M
CVE-2022-48694

*
  • M
CVE-2022-48704

*
  • M
CVE-2022-48696

*
  • M
CVE-2022-48687

*
  • M
CVE-2022-48671

*
  • M
CVE-2022-48705

*
  • M
CVE-2022-48689

*
  • M
CVE-2022-48703

*
  • M
CVE-2022-48686

*
  • M
CVE-2022-48675

*
  • M
CVE-2022-48672

*
  • M
CVE-2022-48695

*
  • M
CVE-2022-48697

*
  • M
CVE-2022-48701

*
  • M
CVE-2022-48670

*
  • M
CVE-2022-48673

*
  • M
CVE-2022-48690

*
  • M
CVE-2022-48692

*
  • M
CVE-2022-48693

*
  • M
CVE-2022-48688

*
  • M
CVE-2024-27057

*
  • M
CVE-2024-27073

*
  • M
CVE-2024-27390

*
  • M
CVE-2024-27077

*
  • M
CVE-2024-27019

*
  • M
CVE-2024-27003

*
  • M
CVE-2024-27030

*
  • M
CVE-2024-27011

*
  • M
CVE-2024-27017

*
  • M
CVE-2024-27038

*
  • M
CVE-2024-27020

*
  • M
CVE-2024-27026

*
  • M
CVE-2024-27047

*
  • M
CVE-2024-26993

*
  • M
CVE-2024-27389

*
  • M
CVE-2024-27052

*
  • M
CVE-2024-27049

*
  • M
CVE-2024-26991

*
  • M
CVE-2024-27010

*
  • M
CVE-2024-27065

*
  • M
CVE-2024-27004

*
  • M
CVE-2024-27056

*
  • M
CVE-2024-27388

*
  • M
CVE-2024-27048

*
  • M
CVE-2024-27042

*
  • M
CVE-2024-26976

*
  • M
CVE-2024-26947

*
  • M
CVE-2024-27014

*
  • M
CVE-2024-27027

*
  • M
CVE-2024-27016

*
  • M
CVE-2024-26989

*
  • M
CVE-2024-26934

*
  • M
CVE-2024-27025

*
  • M
CVE-2024-27031

*
  • M
CVE-2024-27062

*
  • M
CVE-2024-26975

*
  • M
CVE-2024-26931

*
  • M
CVE-2024-27013

*
  • M
CVE-2024-27023

*
  • M
CVE-2024-27059

*
  • M
CVE-2024-26982

*
  • M
CVE-2024-26962

*
  • M
CVE-2024-26938

*
  • M
CVE-2024-27046

*
  • M
CVE-2024-27000

*
  • M
CVE-2024-26930

*
  • M
CVE-2024-26972

*
  • M
CVE-2024-26984

*
  • M
CVE-2024-27055

*
  • M
CVE-2024-27050

*
  • M
CVE-2024-26992

*
  • M
CVE-2024-27002

*
  • M
CVE-2024-27079

*
  • M
CVE-2024-26988

*
  • M
CVE-2024-27022

*
  • M
CVE-2024-26961

*
  • M
CVE-2024-27012

*
  • M
CVE-2024-26953

*
  • M
CVE-2024-26999

*
  • M
CVE-2024-26950

*
  • M
CVE-2024-26933

*
  • M
CVE-2024-26990

*
  • M
CVE-2024-26973

*
  • M
CVE-2024-26958

*
  • M
CVE-2024-26945

*
  • M
CVE-2024-27039

*
  • M
CVE-2024-26951

*
  • M
CVE-2024-26979

*
  • M
CVE-2024-26960

*
  • M
CVE-2024-27015

*
  • M
CVE-2024-26987

*
  • M
CVE-2024-26939

*
  • M
CVE-2024-26946

*
  • M
CVE-2024-26964

*
  • M
CVE-2024-26937

*
  • M
CVE-2024-26935

*
  • M
CVE-2024-26929

*
  • M
CVE-2024-26940

*
  • M
CVE-2023-52651

*
  • M
CVE-2023-52653

*
  • M
CVE-2023-52650

*
  • M
CVE-2023-52649

*
  • M
CVE-2023-52648

*
  • M
CVE-2022-48669

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • L
Race Condition

*
  • M
Deadlock

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
CVE-2024-26927

*
  • M
CVE-2023-52646

*
  • M
CVE-2022-48643

*
  • M
CVE-2022-48651

*
  • M
CVE-2022-48660

*
  • M
CVE-2022-48662

*
  • M
CVE-2022-48663

*
  • M
CVE-2022-48666

*
  • M
CVE-2022-48657

*
  • M
CVE-2022-48653

*
  • M
CVE-2022-48654

*
  • M
CVE-2022-48652

*
  • M
CVE-2022-48659

*
  • M
CVE-2022-48641

*
  • M
CVE-2022-48648

*
  • M
CVE-2022-48658

*
  • M
CVE-2022-48650

*
  • M
CVE-2022-48646

*
  • M
CVE-2022-48644

*
  • M
CVE-2022-48647

*
  • M
CVE-2022-48649

*
  • M
CVE-2022-48642

*
  • M
CVE-2022-48638

*
  • M
CVE-2022-48631

*
  • M
CVE-2022-48632

*
  • M
CVE-2022-48640

*
  • M
CVE-2022-48637

*
  • M
CVE-2022-48639

*
  • M
CVE-2022-48635

*
  • M
Integer Underflow

*
  • M
Resource Leak

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Race Condition

*
  • M
Improper Locking

*
  • L
Improper Input Validation

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
CVE-2024-26921

*
  • M
CVE-2024-26919

*
  • M
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Race Condition

*
  • M
CVE-2024-26915

*
  • M
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Incomplete Cleanup

*
  • L
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • L
Race Condition

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • M
Resource Injection

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Improper Input Validation

*
  • L
Unchecked Return Value to NULL Pointer Dereference

*
  • M
CVE-2024-26920

*
  • M
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Resource Locking

*
  • L
Data Element containing Pointer Item without Proper Copy Control Element

*
  • M
CVE-2024-26918

*
  • L
Race Condition

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Excessive Platform Resource Consumption within a Loop

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • M
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
CVE-2024-26782

*
  • M
CVE-2024-26786

*
  • M
CVE-2024-26783

*
  • L
Resource Injection

*
  • M
CVE-2024-26803

*
  • M
Use After Free

*
  • M
CVE-2024-26785

*
  • M
CVE-2024-26804

*
  • M
CVE-2024-26801

*
  • M
Improper Input Validation

*
  • L
Deadlock

*
  • M
Improper Handling of Values

*
  • L
Divide By Zero

*
  • M
Incomplete Cleanup

*
  • M
Improper Handling of Values

*
  • M
Race Condition

*
  • M
Improper Null Termination

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Divide By Zero

*
  • L
Deadlock

*
  • M
Race Condition

*
  • L
Unchecked Input for Loop Condition

*
  • M
Improper Null Termination

*
  • M
Use After Free

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Double Free

*
  • M
Deadlock

*
  • M
Race Condition

*
  • M
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • M
Divide By Zero

*
  • L
Resource Injection

*
  • L
Improper Null Termination

*
  • M
Race Condition

*
  • L
Improper Input Validation

*
  • M
Improper Handling of Undefined Parameters

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Deadlock

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Race Condition

*
  • L
Unchecked Input for Loop Condition

*
  • M
Improper Protection Against Physical Side Channels

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Resource Leak

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Missing Lock Check

*
  • L
Improper Locking

*
  • M
Integer Underflow

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Improper Resource Locking

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • L
Missing Initialization of a Variable

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Missing Lock Check

*
  • M
Resource Injection

*
  • M
Deadlock

*
  • L
Stack-based Buffer Overflow

*
  • M
Unchecked Input for Loop Condition

*
  • L
Memory Leak

*
  • M
Use After Free

*
  • M
Return of Wrong Status Code

*
  • M
Use of NullPointerException Catch to Detect NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Deadlock

*
  • M
Deadlock

*
  • L
Improper Resource Locking

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • M
Return of Stack Variable Address

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Resource Locking

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • L
Use of Uninitialized Variable

*
  • M
Use After Free

*
  • L
Double Free

*
  • M
Improper Input Validation

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Leak

*
  • M
Improper Resource Locking

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52575

*
  • M
CVE-2023-52520

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • M
Memory Leak

*
  • M
Resource Injection

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • L
Missing Encryption of Sensitive Data

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • L
Divide By Zero

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
CVE-2024-26615

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • M
Deadlock

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2021-47018

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Untrusted Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • M
Resource Leak

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • L
Stack-based Buffer Overflow

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
Range Error

*
  • M
Improper Input Validation

*
  • L
CVE-2021-46914

*
  • L
Missing Support for Integrity Check

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Unchecked Error Condition

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • L
CVE-2023-52474

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Range Error

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Untrusted Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52462

*
  • L
Use After Free

*
  • M
CVE-2023-52455

*
  • M
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-26581

*
  • M
Use After Free

*
  • M
Improper Authentication

*
  • M
Memory Leak

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
CVE-2024-25744

*
  • M
CVE-2024-25741

*
  • M
Stack-based Buffer Overflow

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Information Exposure

*
  • H
Integer Overflow or Wraparound

<0:5.14.0-284.11.1.el9_2
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Improper Handling of Values

*
  • M
Resource Leak

*
  • L
Information Exposure

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • H
Out-of-Bounds

<0:5.14.0-284.30.1.el9_2
  • L
Use After Free

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Improper Zeroization of Hardware Register

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • M
Information Exposure

*
  • H
Out-of-bounds Read

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Improper Resource Locking

<0:5.14.0-284.30.1.el9_2
  • M
Divide By Zero

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Sensitive Information Uncleared Before Release

*
  • M
Reachable Assertion

*
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
Execution with Unnecessary Privileges

<0:5.14.0-284.18.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
Exposure of Resource to Wrong Sphere

<0:5.14.0-284.11.1.el9_2
  • M
Improper Update of Reference Count

*
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-bounds Read

<0:5.14.0-284.18.1.el9_2
  • M
Use After Free

*
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.25.1.el9_2
  • M
Use After Free

*
  • H
Interpretation Conflict

<0:5.14.0-284.11.1.el9_2
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.30.1.el9_2
  • M
Out-of-bounds Read

*
  • L
Improper Initialization

*
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • M
CVE-2022-27672

*
  • M
Use After Free

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • L
Externally Controlled Reference to a Resource in Another Sphere

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Write-what-where Condition

<0:5.14.0-284.11.1.el9_2
  • L
Use After Free

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Insecure Default Initialization of Resource

<0:5.14.0-284.11.1.el9_2
  • L
Memory Leak

*
  • H
Non-exit on Failed Initialization

<0:5.14.0-284.11.1.el9_2
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • H
Memory Leak

<0:5.14.0-284.11.1.el9_2
  • L
Memory Leak

*
  • L
Memory Leak

*
  • H
Race Condition

<0:5.14.0-284.25.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • H
Memory Leak

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • M
Race Condition

*
  • M
Improper Locking

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition During Access to Alternate Channel

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Authentication Bypass by Primary Weakness

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • L
Expected Behavior Violation

*
  • H
Incorrect Control Flow Scoping

<0:5.14.0-284.11.1.el9_2
  • H
Improper Input Validation

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • M
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • M
Out-of-bounds Read

*
  • H
Expected Behavior Violation

<0:5.14.0-284.11.1.el9_2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • L
Out-of-bounds Read

*
  • H
Improper Update of Reference Count

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Incomplete Cleanup

<0:5.14.0-284.11.1.el9_2
  • M
Out-of-bounds Write

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Race Condition

*
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • M
Improper Preservation of Permissions

*
  • L
Buffer Overflow

*
  • M
Memory Leak

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Out-of-Bounds

*
  • M
Race Condition

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • M
Out-of-Bounds

*
  • M
Insufficient Comparison

*
  • L
Information Exposure

*
  • M
Use After Free

*
  • M
Improper Initialization

*
  • L
Incorrect Authorization

*
  • M
Information Exposure

*
  • L
Improper Cleanup on Thrown Exception

*
  • M
Authentication Bypass

*
  • L
Incorrect Check of Function Return Value

*