kernel-rt-debug-core vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-rt-debug-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2024-27393

*
  • M
CVE-2024-27399

*
  • M
CVE-2024-27398

*
  • M
CVE-2024-27397

*
  • M
CVE-2024-27401

*
  • M
CVE-2024-27395

*
  • M
CVE-2024-21823

*
  • M
CVE-2023-52656

*
  • M
CVE-2023-52654

*
  • L
CVE-2024-27043

*
  • M
CVE-2024-26974

*
  • M
CVE-2022-48702

*
  • M
CVE-2022-48691

*
  • M
CVE-2022-48694

*
  • M
CVE-2022-48704

*
  • M
CVE-2022-48696

*
  • M
CVE-2022-48671

*
  • M
CVE-2022-48687

*
  • M
CVE-2022-48705

*
  • M
CVE-2022-48689

*
  • M
CVE-2022-48703

*
  • M
CVE-2022-48686

*
  • M
CVE-2022-48675

*
  • M
CVE-2022-48672

*
  • M
CVE-2022-48695

*
  • M
CVE-2022-48701

*
  • M
CVE-2022-48670

*
  • M
CVE-2022-48697

*
  • M
CVE-2022-48673

*
  • M
CVE-2022-48690

*
  • M
CVE-2022-48692

*
  • M
CVE-2022-48693

*
  • M
CVE-2022-48688

*
  • M
CVE-2024-27057

*
  • M
CVE-2024-27390

*
  • M
CVE-2024-27073

*
  • M
CVE-2024-27003

*
  • M
CVE-2024-27077

*
  • M
CVE-2024-27030

*
  • M
CVE-2024-27017

*
  • M
CVE-2024-27019

*
  • M
CVE-2024-27011

*
  • M
CVE-2024-27020

*
  • M
CVE-2024-27038

*
  • M
CVE-2024-26993

*
  • M
CVE-2024-27047

*
  • M
CVE-2024-27052

*
  • M
CVE-2024-27026

*
  • M
CVE-2024-26991

*
  • M
CVE-2024-27389

*
  • M
CVE-2024-27010

*
  • M
CVE-2024-27065

*
  • M
CVE-2024-27049

*
  • M
CVE-2024-27056

*
  • M
CVE-2024-27048

*
  • M
CVE-2024-27042

*
  • M
CVE-2024-27388

*
  • M
CVE-2024-27004

*
  • M
CVE-2024-26976

*
  • M
CVE-2024-27014

*
  • M
CVE-2024-27016

*
  • M
CVE-2024-27027

*
  • M
CVE-2024-26947

*
  • M
CVE-2024-26989

*
  • M
CVE-2024-27025

*
  • M
CVE-2024-27031

*
  • M
CVE-2024-26934

*
  • M
CVE-2024-27062

*
  • M
CVE-2024-26931

*
  • M
CVE-2024-26975

*
  • M
CVE-2024-27059

*
  • M
CVE-2024-26962

*
  • M
CVE-2024-27023

*
  • M
CVE-2024-26982

*
  • M
CVE-2024-27013

*
  • M
CVE-2024-26930

*
  • M
CVE-2024-27000

*
  • M
CVE-2024-26972

*
  • M
CVE-2024-26938

*
  • M
CVE-2024-27046

*
  • M
CVE-2024-27050

*
  • M
CVE-2024-27055

*
  • M
CVE-2024-26984

*
  • M
CVE-2024-27002

*
  • M
CVE-2024-26988

*
  • M
CVE-2024-27079

*
  • M
CVE-2024-26992

*
  • M
CVE-2024-27022

*
  • M
CVE-2024-26961

*
  • M
CVE-2024-26999

*
  • M
CVE-2024-27012

*
  • M
CVE-2024-26950

*
  • M
CVE-2024-26990

*
  • M
CVE-2024-26953

*
  • M
CVE-2024-26958

*
  • M
CVE-2024-26973

*
  • M
CVE-2024-27039

*
  • M
CVE-2024-26945

*
  • M
CVE-2024-26933

*
  • M
CVE-2024-26960

*
  • M
CVE-2024-26987

*
  • M
CVE-2024-26951

*
  • M
CVE-2024-27015

*
  • M
CVE-2024-26979

*
  • M
CVE-2024-26946

*
  • M
CVE-2024-26939

*
  • M
CVE-2024-26964

*
  • M
CVE-2024-26935

*
  • M
CVE-2024-26937

*
  • M
CVE-2024-26929

*
  • M
CVE-2024-26940

*
  • M
CVE-2023-52651

*
  • M
CVE-2023-52650

*
  • M
CVE-2023-52653

*
  • M
CVE-2023-52649

*
  • M
CVE-2023-52648

*
  • M
CVE-2022-48669

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • L
Race Condition

*
  • L
Use After Free

*
  • M
Deadlock

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
CVE-2024-26927

*
  • M
CVE-2023-52646

*
  • M
CVE-2022-48660

*
  • M
CVE-2022-48643

*
  • M
CVE-2022-48663

*
  • M
CVE-2022-48657

*
  • M
CVE-2022-48662

*
  • M
CVE-2022-48651

*
  • M
CVE-2022-48666

*
  • M
CVE-2022-48654

*
  • M
CVE-2022-48652

*
  • M
CVE-2022-48653

*
  • M
CVE-2022-48641

*
  • M
CVE-2022-48648

*
  • M
CVE-2022-48658

*
  • M
CVE-2022-48659

*
  • M
CVE-2022-48644

*
  • M
CVE-2022-48646

*
  • M
CVE-2022-48650

*
  • M
CVE-2022-48642

*
  • M
CVE-2022-48638

*
  • M
CVE-2022-48647

*
  • M
CVE-2022-48649

*
  • M
CVE-2022-48640

*
  • M
CVE-2022-48631

*
  • M
CVE-2022-48632

*
  • M
CVE-2022-48635

*
  • M
CVE-2022-48639

*
  • M
CVE-2022-48637

*
  • M
Integer Underflow

*
  • M
Resource Leak

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Race Condition

*
  • M
Improper Locking

*
  • L
Improper Input Validation

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
CVE-2024-26921

*
  • M
Race Condition

*
  • M
CVE-2024-26919

*
  • M
Resource Injection

*
  • M
Race Condition

*
  • L
Improper Input Validation

*
  • M
CVE-2024-26915

*
  • L
Stack-based Buffer Overflow

*
  • L
Incomplete Cleanup

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Race Condition

*
  • M
Resource Injection

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Improper Input Validation

*
  • L
Unchecked Return Value to NULL Pointer Dereference

*
  • M
CVE-2024-26920

*
  • M
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Race Condition

*
  • L
Improper Resource Locking

*
  • L
Data Element containing Pointer Item without Proper Copy Control Element

*
  • M
CVE-2024-26918

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • L
Excessive Platform Resource Consumption within a Loop

*
  • L
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
CVE-2024-26782

*
  • M
CVE-2024-26786

*
  • M
CVE-2024-26783

*
  • M
CVE-2024-26803

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • M
CVE-2024-26785

*
  • M
CVE-2024-26804

*
  • M
CVE-2024-26801

*
  • M
Improper Input Validation

*
  • L
Deadlock

*
  • M
Improper Handling of Values

*
  • L
Divide By Zero

*
  • M
Improper Handling of Values

*
  • M
Incomplete Cleanup

*
  • M
Race Condition

*
  • M
Improper Null Termination

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Deadlock

*
  • L
Divide By Zero

*
  • M
Race Condition

*
  • L
Unchecked Input for Loop Condition

*
  • M
Use After Free

*
  • M
Improper Null Termination

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Double Free

*
  • M
Deadlock

*
  • M
Heap-based Buffer Overflow

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
Divide By Zero

*
  • M
Improper Input Validation

*
  • L
Resource Injection

*
  • L
Improper Null Termination

*
  • M
Improper Handling of Undefined Parameters

*
  • L
Improper Input Validation

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Improper Input Validation

*
  • M
Deadlock

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Race Condition

*
  • M
Improper Protection Against Physical Side Channels

*
  • L
Resource Injection

*
  • L
Unchecked Input for Loop Condition

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Resource Leak

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Integer Overflow or Wraparound

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Missing Lock Check

*
  • L
Improper Locking

*
  • M
Integer Underflow

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Improper Resource Locking

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Missing Initialization of a Variable

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Missing Lock Check

*
  • M
Resource Injection

*
  • M
Deadlock

*
  • L
Stack-based Buffer Overflow

*
  • M
Resource Leak

*
  • M
Unchecked Input for Loop Condition

*
  • L
Memory Leak

*
  • M
Use After Free

*
  • M
Return of Wrong Status Code

*
  • L
Improper Input Validation

*
  • M
Use of NullPointerException Catch to Detect NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • M
Deadlock

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Deadlock

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Return of Stack Variable Address

*
  • M
Race Condition

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Shutdown or Release

*
  • M
NULL Pointer Dereference

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Resource Locking

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • L
Use of Uninitialized Variable

*
  • M
Use After Free

*
  • L
Double Free

*
  • M
Improper Input Validation

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Improper Input Validation

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Resource Locking

*
  • M
Resource Leak

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-26602

*
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Race Condition

*
  • M
CVE-2023-52520

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52575

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • M
Memory Leak

*
  • M
Memory Leak

*
  • M
Resource Injection

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • L
Missing Encryption of Sensitive Data

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • L
Divide By Zero

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • M
CVE-2024-26615

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • M
Deadlock

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • M
Deadlock

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2021-47018

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Untrusted Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • M
Resource Leak

*
  • L
Stack-based Buffer Overflow

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • M
Range Error

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
Improper Input Validation

*
  • L
CVE-2021-46914

*
  • L
Missing Support for Integrity Check

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Unchecked Error Condition

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • L
CVE-2023-52474

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Range Error

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Untrusted Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
CVE-2023-52462

*
  • L
Use After Free

*
  • M
CVE-2023-52455

*
  • M
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Return of Wrong Status Code

*
  • M
Use After Free

*
  • M
CVE-2024-26581

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Improper Authentication

*
  • M
Memory Leak

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
CVE-2024-25744

*
  • M
CVE-2024-25741

*
  • M
Stack-based Buffer Overflow

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • H
Integer Overflow or Wraparound

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
NULL Pointer Dereference

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Deadlock

*
  • M
Improper Handling of Values

*
  • M
Deadlock

*
  • M
Integer Underflow

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • H
Use After Free

*
  • M
Memory Leak

*
  • M
Race Condition

*
  • H
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • H
Out-of-Bounds

*
  • M
Man-in-the-Middle (MitM)

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Sensitive Information Uncleared Before Release

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Insufficient Comparison

*
  • M
Resource Exhaustion

*
  • M
Authentication Bypass

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Information Exposure

*
  • M
Race Condition

*
  • L
Use After Free

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Improper Privilege Management

*
  • H
Improper Update of Reference Count

*
  • H
Buffer Overflow

*
  • H
Double Free

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Use After Free

*
  • M
NULL Pointer Dereference

*
  • H
Improper Input Validation

*
  • M
Use After Free

*
  • M
Race Condition

*
  • H
Integer Underflow

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Use After Free

*
  • M
Use After Free

*
  • H
Use After Free

*
  • M
Use After Free

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Access Control

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Validation of Array Index

*
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • M
Use After Free

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Improper Zeroization of Hardware Register

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • H
Double Free

*
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

*
  • M
Information Exposure

*
  • H
Out-of-bounds Read

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • M
Use After Free

*
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • M
Race Condition

*
  • M
Double Free

*
  • M
Resource Exhaustion

*
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • H
Improper Resource Locking

<0:5.14.0-284.30.1.rt14.315.el9_2
  • M
Incorrect Bitwise Shift of Integer

*
  • M
CVE-2023-31084

*
  • M
Divide By Zero

*
  • M
Race Condition

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Information Exposure

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Reachable Assertion

*
  • H
Use After Free

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Execution with Unnecessary Privileges

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.rt14.303.el9_2
  • L
Improper Resource Locking

*
  • H
Exposure of Resource to Wrong Sphere

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Improper Update of Reference Count

*
  • M
Improperly Implemented Security Check for Standard

*
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

<0:5.14.0-284.18.1.rt14.303.el9_2
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.25.1.rt14.310.el9_2
  • M
Improper Validation of Array Index

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incorrect Authorization

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Double Free

*
  • H
Interpretation Conflict

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Double Free

*
  • M
Use of Uninitialized Variable

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.30.1.rt14.315.el9_2
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • H
Double Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Improper Ownership Management

<0:5.14.0-162.23.1.rt21.186.el9_1
  • L
Improper Initialization

*
  • H
Use After Free

<0:5.14.0-284.18.1.rt14.303.el9_2
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Authentication Bypass

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • L
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • L
Use After Free

*
  • M
CVE-2022-27672

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • L
Externally Controlled Reference to a Resource in Another Sphere

*
  • M
Memory Leak

*
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Write-what-where Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • L
Use After Free

*
  • H
Use After Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Integer Overflow or Wraparound

<0:5.14.0-162.18.1.rt21.181.el9_1
  • M
Use After Free

*
  • H
Insecure Default Initialization of Resource

<0:5.14.0-284.11.1.rt14.296.el9_2
  • L
Memory Leak

*
  • H
Use After Free

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Non-exit on Failed Initialization

<0:5.14.0-284.11.1.rt14.296.el9_2
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • H
Memory Leak

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Logging of Excessive Data

*
  • M
Unchecked Return Value

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Buffer Overflow

<0:5.14.0-162.18.1.rt21.181.el9_1
  • M
Integer Overflow or Wraparound

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • H
Race Condition

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

*
  • H
Use After Free

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Memory Leak

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Race Condition

*
  • M
Improper Locking

*
  • H
Deadlock

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Improper Preservation of Permissions

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Access of Uninitialized Pointer

*
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition During Access to Alternate Channel

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

*
  • H
Allocation of Resources Without Limits or Throttling

<0:5.14.0-162.12.1.rt21.175.el9_1
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Authentication Bypass by Primary Weakness

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Information Exposure

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Information Exposure

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Information Exposure

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Information Exposure

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Information Exposure

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

*
  • L
Expected Behavior Violation

*
  • H
Incorrect Control Flow Scoping

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Input Validation

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • H
Buffer Overflow

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Out-of-bounds Read

*
  • M
Missing Report of Error Condition

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

*
  • H
Expected Behavior Violation

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Out-of-bounds Write

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Buffer Overflow

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.rt14.296.el9_2
  • L
Out-of-bounds Read

*
  • H
Out-of-Bounds

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Improper Locking

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Improper Update of Reference Count

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Incorrect Calculation of Buffer Size

<0:5.14.0-162.18.1.rt21.181.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Use After Free

<0:5.14.0-70.30.1.rt21.102.el9_0
  • M
CVE-2022-36946

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incorrect Conversion between Numeric Types

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Improper Locking

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
NULL Pointer Dereference

*
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Incomplete Cleanup

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Comparison Using Wrong Factors

<0:5.14.0-70.26.1.rt21.98.el9_0
  • H
Use After Free

<0:5.14.0-70.17.1.rt21.89.el9_0
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Privilege Defined With Unsafe Actions

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Buffer Overflow

<0:5.14.0-70.26.1.rt21.98.el9_0
  • M
Out-of-bounds Write

*
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-70.17.1.rt21.89.el9_0
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Race Condition

<0:5.14.0-70.17.1.rt21.89.el9_0
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Incorrect Default Permissions

<0:5.14.0-162.12.1.rt21.175.el9_1
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Race Condition

*
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Information Exposure

<0:5.14.0-70.17.1.rt21.89.el9_0
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Double Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Double Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-70.22.1.rt21.94.el9_0
  • M
Information Exposure

*
  • M
Missing Initialization of Resource

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Heap-based Buffer Overflow

<0:5.14.0-70.17.1.rt21.89.el9_0
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use of Uninitialized Resource

<0:5.14.0-70.22.1.rt21.94.el9_0
  • M
Memory Leak

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Information Exposure

*
  • M
Memory Leak

*
  • M
Authentication Bypass

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Out-of-bounds Write

*
  • M
Improper Preservation of Permissions

*
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • L
Buffer Overflow

*
  • M
Memory Leak

*
  • M
Use of Uninitialized Resource

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

<0:5.14.0-162.6.1.rt21.168.el9_1