CVE-2024-27393
| |
CVE-2024-27399
| |
CVE-2024-27398
| |
CVE-2024-27397
| |
CVE-2024-27401
| |
CVE-2024-27395
| |
CVE-2024-21823
| |
CVE-2023-52656
| |
CVE-2023-52654
| |
CVE-2024-27043
| |
CVE-2024-26974
| |
CVE-2022-48702
| |
CVE-2022-48691
| |
CVE-2022-48694
| |
CVE-2022-48696
| |
CVE-2022-48704
| |
CVE-2022-48671
| |
CVE-2022-48687
| |
CVE-2022-48689
| |
CVE-2022-48705
| |
CVE-2022-48703
| |
CVE-2022-48686
| |
CVE-2022-48675
| |
CVE-2022-48672
| |
CVE-2022-48701
| |
CVE-2022-48695
| |
CVE-2022-48670
| |
CVE-2022-48673
| |
CVE-2022-48697
| |
CVE-2022-48690
| |
CVE-2022-48692
| |
CVE-2022-48693
| |
CVE-2022-48688
| |
CVE-2024-27057
| |
CVE-2024-27073
| |
CVE-2024-27390
| |
CVE-2024-27077
| |
CVE-2024-27003
| |
CVE-2024-27030
| |
CVE-2024-27019
| |
CVE-2024-27011
| |
CVE-2024-27038
| |
CVE-2024-27020
| |
CVE-2024-27017
| |
CVE-2024-27047
| |
CVE-2024-27389
| |
CVE-2024-26993
| |
CVE-2024-27052
| |
CVE-2024-27026
| |
CVE-2024-27010
| |
CVE-2024-26991
| |
CVE-2024-27065
| |
CVE-2024-27049
| |
CVE-2024-27388
| |
CVE-2024-27048
| |
CVE-2024-27056
| |
CVE-2024-27042
| |
CVE-2024-27004
| |
CVE-2024-26976
| |
CVE-2024-27027
| |
CVE-2024-27016
| |
CVE-2024-27014
| |
CVE-2024-26947
| |
CVE-2024-26989
| |
CVE-2024-26934
| |
CVE-2024-27025
| |
CVE-2024-27062
| |
CVE-2024-27031
| |
CVE-2024-26931
| |
CVE-2024-26975
| |
CVE-2024-27023
| |
CVE-2024-27059
| |
CVE-2024-26962
| |
CVE-2024-27013
| |
CVE-2024-26982
| |
CVE-2024-27046
| |
CVE-2024-27000
| |
CVE-2024-26930
| |
CVE-2024-26938
| |
CVE-2024-26972
| |
CVE-2024-27050
| |
CVE-2024-27055
| |
CVE-2024-26984
| |
CVE-2024-27079
| |
CVE-2024-27002
| |
CVE-2024-26988
| |
CVE-2024-26992
| |
CVE-2024-27022
| |
CVE-2024-27012
| |
CVE-2024-26961
| |
CVE-2024-26999
| |
CVE-2024-26953
| |
CVE-2024-26990
| |
CVE-2024-26973
| |
CVE-2024-26950
| |
CVE-2024-26958
| |
CVE-2024-27039
| |
CVE-2024-26933
| |
CVE-2024-26951
| |
CVE-2024-26945
| |
CVE-2024-26960
| |
CVE-2024-26987
| |
CVE-2024-26979
| |
CVE-2024-27015
| |
CVE-2024-26939
| |
CVE-2024-26946
| |
CVE-2024-26964
| |
CVE-2024-26937
| |
CVE-2024-26935
| |
CVE-2024-26929
| |
CVE-2024-26940
| |
CVE-2023-52651
| |
CVE-2023-52650
| |
CVE-2023-52653
| |
CVE-2023-52649
| |
CVE-2023-52648
| |
CVE-2022-48669
| |
Stack-based Buffer Overflow
| |
Improper Neutralization of Null Byte or NUL Character
| |
Improper Input Validation
| |
Race Condition
| |
Use After Free
| |
Deadlock
| |
Use After Free
| |
Out-of-Bounds
| |
CVE-2024-26927
| |
CVE-2023-52646
| |
CVE-2022-48643
| |
CVE-2022-48660
| |
CVE-2022-48662
| |
CVE-2022-48651
| |
CVE-2022-48666
| |
CVE-2022-48657
| |
CVE-2022-48663
| |
CVE-2022-48654
| |
CVE-2022-48653
| |
CVE-2022-48652
| |
CVE-2022-48641
| |
CVE-2022-48659
| |
CVE-2022-48648
| |
CVE-2022-48658
| |
CVE-2022-48650
| |
CVE-2022-48646
| |
CVE-2022-48644
| |
CVE-2022-48647
| |
CVE-2022-48638
| |
CVE-2022-48642
| |
CVE-2022-48649
| |
CVE-2022-48631
| |
CVE-2022-48632
| |
CVE-2022-48640
| |
CVE-2022-48637
| |
CVE-2022-48639
| |
CVE-2022-48635
| |
Integer Underflow
| |
Resource Leak
| |
Improper Validation of Specified Index, Position, or Offset in Input
| |
Use After Free
| |
Race Condition
| |
Race Condition
| |
Improper Locking
| |
Improper Input Validation
| |
Deadlock
| |
NULL Pointer Dereference
| |
Resource Leak
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26921
| |
Race Condition
| |
CVE-2024-26919
| |
Resource Injection
| |
Race Condition
| |
Improper Input Validation
| |
CVE-2024-26915
| |
Stack-based Buffer Overflow
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
Incomplete Cleanup
| |
Race Condition
| |
NULL Pointer Dereference
| |
Race Condition
| |
Resource Injection
| |
Race Condition
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
Resource Leak
| |
Resource Injection
| |
Resource Leak
| |
Unchecked Return Value to NULL Pointer Dereference
| |
Improper Input Validation
| |
CVE-2024-26920
| |
Improper Input Validation
| |
Stack-based Buffer Overflow
| |
Memory Leak
| |
Out-of-bounds Read
| |
Resource Injection
| |
Improper Input Validation
| |
Improper Input Validation
| |
Race Condition
| |
Data Element containing Pointer Item without Proper Copy Control Element
| |
CVE-2024-26918
| |
Improper Resource Locking
| |
Stack-based Buffer Overflow
| |
Improper Input Validation
| |
Use After Free
| |
Improper Input Validation
| |
Improper Input Validation
| |
Improper Input Validation
| |
Divide By Zero
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Resource Leak
| |
Improper Input Validation
| |
Buffer Access with Incorrect Length Value
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Out-of-bounds Read
| |
Use After Free
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Improper Neutralization of Null Byte or NUL Character
| |
Excessive Platform Resource Consumption within a Loop
| |
Out-of-bounds Read
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Race Condition
| |
CVE-2024-26782
| |
CVE-2024-26786
| |
CVE-2024-26783
| |
CVE-2024-26803
| |
Resource Injection
| |
Use After Free
| |
CVE-2024-26785
| |
CVE-2024-26804
| |
CVE-2024-26801
| |
Improper Input Validation
| |
Deadlock
| |
Improper Handling of Values
| |
Divide By Zero
| |
Improper Handling of Values
| |
Incomplete Cleanup
| |
Race Condition
| |
Improper Null Termination
| |
Improper Input Validation
| |
Improper Input Validation
| |
Deadlock
| |
Divide By Zero
| |
Race Condition
| |
Unchecked Input for Loop Condition
| |
Improper Null Termination
| |
Use After Free
| |
NULL Pointer Dereference
| |
Deadlock
| |
Resource Injection
| |
Double Free
| |
Deadlock
| |
Race Condition
| |
Heap-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Divide By Zero
| |
Resource Injection
| |
Improper Input Validation
| |
Improper Null Termination
| |
Improper Input Validation
| |
Improper Handling of Undefined Parameters
| |
Race Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Deadlock
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Resource Injection
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Use After Free
| |
Deadlock
| |
Race Condition
| |
Unchecked Input for Loop Condition
| |
Resource Injection
| |
Improper Protection Against Physical Side Channels
| |
Improper Input Validation
| |
Use After Free
| |
Resource Injection
| |
Out-of-bounds Read
| |
Improper Input Validation
| |
Out-of-Bounds
| |
Out-of-bounds Read
| |
Resource Leak
| |
Resource Injection
| |
Resource Injection
| |
Improper Resource Locking
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Resource Injection
| |
Improper Input Validation
| |
Missing Lock Check
| |
Improper Locking
| |
Integer Underflow
| |
NULL Pointer Dereference
| |
Deadlock
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Race Condition
| |
Resource Injection
| |
Out-of-bounds Read
| |
Race Condition
| |
Resource Injection
| |
Improper Resource Locking
| |
Incorrect Calculation of Buffer Size
| |
Resource Injection
| |
Race Condition
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Improper Input Validation
| |
Missing Initialization of a Variable
| |
Improper Input Validation
| |
Resource Injection
| |
Missing Lock Check
| |
Deadlock
| |
Resource Injection
| |
Stack-based Buffer Overflow
| |
Resource Leak
| |
Unchecked Input for Loop Condition
| |
Memory Leak
| |
Use After Free
| |
Return of Wrong Status Code
| |
Use of NullPointerException Catch to Detect NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Stack-based Buffer Overflow
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Out-of-bounds Read
| |
Deadlock
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
Deadlock
| |
NULL Pointer Dereference
| |
Deadlock
| |
NULL Pointer Dereference
| |
Improper Resource Locking
| |
Improper Input Validation
| |
Use After Free
| |
Resource Exhaustion
| |
Return of Stack Variable Address
| |
Race Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
Improper Resource Shutdown or Release
| |
NULL Pointer Dereference
| |
Improper Protection Against Physical Side Channels
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Resource Locking
| |
Improper Resource Locking
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Leak
| |
Use of Uninitialized Variable
| |
Use After Free
| |
Double Free
| |
Improper Input Validation
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Improper Input Validation
| |
Integer Overflow or Wraparound
| |
Resource Leak
| |
Improper Resource Locking
| |
Integer Overflow or Wraparound
| |
NULL Pointer Dereference
| |
CVE-2024-26602
| |
Unchecked Return Value
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Stack-based Buffer Overflow
| |
Incorrect Calculation of Buffer Size
| |
Use After Free
| |
Race Condition
| |
NULL Pointer Dereference
| |
CVE-2023-52520
| |
CVE-2023-52575
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Improper Input Validation
| |
Race Condition
| |
Resource Leak
| |
Memory Leak
| |
Memory Leak
| |
Resource Injection
| |
Improper Handling of Overlap Between Protected Memory Ranges
| |
Missing Encryption of Sensitive Data
| |
Use After Free
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Race Condition
| |
Resource Leak
| |
Divide By Zero
| |
Resource Injection
| |
Resource Leak
| |
Improper Input Validation
| |
CVE-2024-26615
| |
Memory Leak
| |
Use After Free
| |
Memory Leak
| |
Deadlock
| |
Use After Free
| |
Out-of-bounds Read
| |
Resource Leak
| |
Memory Leak
| |
Use After Free
| |
Deadlock
| |
Out-of-Bounds
| |
NULL Pointer Dereference
| |
CVE-2021-47018
| |
Memory Leak
| |
NULL Pointer Dereference
| |
Use After Free
| |
Untrusted Pointer Dereference
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Resource Leak
| |
Resource Leak
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Use After Free
| |
Use After Free
| |
Resource Leak
| |
Resource Leak
| |
Race Condition
| |
Resource Leak
| |
Improper Check or Handling of Exceptional Conditions
| |
Stack-based Buffer Overflow
| |
Use After Free
| |
Resource Leak
| |
Range Error
| |
Improper Input Validation
| |
CVE-2021-46914
| |
Missing Support for Integrity Check
| |
Resource Injection
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Unchecked Error Condition
| |
Improper Input Validation
| |
Use After Free
| |
Out-of-bounds Read
| |
Integer Overflow or Wraparound
| |
Out-of-bounds Read
| |
CVE-2023-52474
| |
Race Condition
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Range Error
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Deadlock
| |
NULL Pointer Dereference
| |
Use After Free
| |
NULL Pointer Dereference
| |
Untrusted Pointer Dereference
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
CVE-2023-52462
| |
Use After Free
| |
CVE-2023-52455
| |
NULL Pointer Dereference
| |
Improper Validation of Array Index
| |
Buffer Access with Incorrect Length Value
| |
NULL Pointer Dereference
| |
Improper Initialization
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Return of Wrong Status Code
| |
Use After Free
| |
CVE-2024-26581
| |
Out-of-Bounds
| |
Use After Free
| |
Improper Authentication
| |
Memory Leak
| |
Improper Check for Unusual or Exceptional Conditions
| |
CVE-2024-25744
| |
CVE-2024-25741
| |
Stack-based Buffer Overflow
| |
Time-of-check Time-of-use (TOCTOU)
| |
Time-of-check Time-of-use (TOCTOU)
| |
Information Exposure
| |
Use After Free
| |
Use After Free
| |
Information Exposure
| |
Integer Overflow or Wraparound
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
NULL Pointer Dereference
| |
Resource Exhaustion
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Out-of-bounds Write
| |
Deadlock
| |
Deadlock
| |
Improper Handling of Values
| |
Integer Underflow
| |
NULL Pointer Dereference
| |
Resource Leak
| |
Out-of-Bounds
| |
Use After Free
| |
Information Exposure
| |
Out-of-bounds Write
| |
Race Condition
| |
Use After Free
| |
Memory Leak
| |
Race Condition
| |
Race Condition
| |
NULL Pointer Dereference
| |
Use After Free
| |
Out-of-bounds Write
| |
Use After Free
| |
Out-of-Bounds
| |
Man-in-the-Middle (MitM)
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
NULL Pointer Dereference
| |
Sensitive Information Uncleared Before Release
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Insufficient Comparison
| |
Resource Exhaustion
| |
Authentication Bypass
| |
Allocation of Resources Without Limits or Throttling
| |
NULL Pointer Dereference
| |
Out-of-bounds Read
| |
Information Exposure
| |
Race Condition
| |
Use After Free
| |
Improper Handling of Exceptional Conditions
| |
NULL Pointer Dereference
| |
Out-of-bounds Write
| |
Improper Privilege Management
| |
Improper Update of Reference Count
| |
Buffer Overflow
| |
Double Free
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Out-of-bounds Read
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Input Validation
| |
Use After Free
| |
Race Condition
| |
Integer Underflow
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Improper Access Control
| |
Use After Free
| |
Stack-based Buffer Overflow
| |
Improper Validation of Array Index
| |
Information Exposure
| |
Out-of-bounds Read
| |
Use After Free
| |
Time-of-check Time-of-use (TOCTOU)
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Use After Free
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Use After Free
| |
Loop with Unreachable Exit Condition ('Infinite Loop')
| |
Use After Free
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Improper Zeroization of Hardware Register
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Use After Free
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Double Free
| |
Use After Free
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Use After Free
| |
Information Exposure
| |
Out-of-bounds Read
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Use After Free
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Use After Free
| |
Out-of-bounds Write
|
<0:5.14.0-284.25.1.rt14.310.el9_2
|
Use After Free
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Race Condition
| |
Double Free
| |
Resource Exhaustion
| |
Out-of-bounds Write
|
<0:5.14.0-284.25.1.rt14.310.el9_2
|
NULL Pointer Dereference
| |
Race Condition
| |
Race Condition
| |
Out-of-bounds Read
| |
NULL Pointer Dereference
| |
Use After Free
| |
Improper Resource Locking
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Incorrect Bitwise Shift of Integer
| |
CVE-2023-31084
| |
Divide By Zero
| |
Race Condition
| |
Release of Invalid Pointer or Reference
| |
Information Exposure
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Reachable Assertion
| |
Use After Free
|
<0:5.14.0-284.18.1.rt14.303.el9_2
|
Execution with Unnecessary Privileges
|
<0:5.14.0-284.18.1.rt14.303.el9_2
|
NULL Pointer Dereference
|
<0:5.14.0-284.25.1.rt14.310.el9_2
|
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
|
<0:5.14.0-284.18.1.rt14.303.el9_2
|
Improper Resource Locking
| |
Exposure of Resource to Wrong Sphere
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Improper Update of Reference Count
| |
Improperly Implemented Security Check for Standard
| |
Out-of-bounds Write
|
<0:5.14.0-284.18.1.rt14.303.el9_2
|
NULL Pointer Dereference
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Out-of-bounds Read
| |
Out-of-bounds Read
|
<0:5.14.0-284.18.1.rt14.303.el9_2
|
NULL Pointer Dereference
| |
Use After Free
| |
Sensitive Information Uncleared Before Release
|
<0:5.14.0-284.25.1.rt14.310.el9_2
|
Improper Validation of Array Index
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Incorrect Authorization
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
| |
Out-of-bounds Read
| |
Use After Free
| |
Use After Free
| |
Double Free
| |
Interpretation Conflict
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Double Free
| |
Use of Uninitialized Variable
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Sensitive Information Uncleared Before Release
|
<0:5.14.0-284.30.1.rt14.315.el9_2
|
Out-of-bounds Read
| |
Use After Free
| |
Double Free
|
<0:5.14.0-162.22.2.rt21.186.el9_1
|
Improper Ownership Management
|
<0:5.14.0-162.23.1.rt21.186.el9_1
|
Improper Initialization
| |
Use After Free
|
<0:5.14.0-284.18.1.rt14.303.el9_2
|
NULL Pointer Dereference
| |
NULL Pointer Dereference
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Authentication Bypass
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
| |
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
CVE-2022-27672
| |
Use After Free
| |
NULL Pointer Dereference
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Memory Leak
| |
Out-of-bounds Write
| |
NULL Pointer Dereference
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Externally Controlled Reference to a Resource in Another Sphere
| |
Memory Leak
| |
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Write-what-where Condition
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
Use After Free
|
<0:5.14.0-162.22.2.rt21.186.el9_1
|
NULL Pointer Dereference
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Integer Overflow or Wraparound
|
<0:5.14.0-162.18.1.rt21.181.el9_1
|
Use After Free
| |
Insecure Default Initialization of Resource
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Memory Leak
| |
Use After Free
|
<0:5.14.0-162.18.1.rt21.181.el9_1
|
Non-exit on Failed Initialization
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
NULL Pointer Dereference
| |
Information Exposure
| |
Memory Leak
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Logging of Excessive Data
| |
Unchecked Return Value
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
NULL Pointer Dereference
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Buffer Overflow
|
<0:5.14.0-162.18.1.rt21.181.el9_1
|
Integer Overflow or Wraparound
| |
Memory Leak
| |
Memory Leak
| |
Race Condition
|
<0:5.14.0-284.25.1.rt14.310.el9_2
|
Out-of-bounds Write
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Out-of-Bounds
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
Use After Free
|
<0:5.14.0-162.18.1.rt21.181.el9_1
|
Memory Leak
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Race Condition
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Race Condition
| |
Improper Locking
| |
Deadlock
|
<0:5.14.0-162.22.2.rt21.186.el9_1
|
Improper Preservation of Permissions
|
<0:5.14.0-162.12.1.rt21.175.el9_1
|
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Access of Uninitialized Pointer
| |
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
NULL Pointer Dereference
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Improper Locking
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Race Condition During Access to Alternate Channel
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Race Condition
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
Allocation of Resources Without Limits or Throttling
|
<0:5.14.0-162.12.1.rt21.175.el9_1
|
Access of Resource Using Incompatible Type ('Type Confusion')
| |
Authentication Bypass by Primary Weakness
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Information Exposure
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Double Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Information Exposure
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Information Exposure
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Information Exposure
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Information Exposure
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
| |
Expected Behavior Violation
| |
Incorrect Control Flow Scoping
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Improper Input Validation
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Buffer Overflow
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
Use After Free
| |
NULL Pointer Dereference
| |
Integer Overflow or Wraparound
| |
Buffer Overflow
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Out-of-Bounds
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
| |
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Out-of-bounds Read
| |
Missing Report of Error Condition
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
| |
Expected Behavior Violation
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Out-of-bounds Write
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Buffer Overflow
|
<0:5.14.0-162.12.1.rt21.175.el9_1
|
Improper Restriction of Communication Channel to Intended Endpoints
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Improper Locking
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Out-of-bounds Read
| |
Out-of-Bounds
|
<0:5.14.0-162.12.1.rt21.175.el9_1
|
Improper Locking
|
<0:5.14.0-162.12.1.rt21.175.el9_1
|
Improper Update of Reference Count
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Incorrect Calculation of Buffer Size
|
<0:5.14.0-162.18.1.rt21.181.el9_1
|
Incomplete Cleanup
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Incomplete Cleanup
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Incomplete Cleanup
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-70.30.1.rt21.102.el9_0
|
CVE-2022-36946
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Incorrect Conversion between Numeric Types
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Improper Locking
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
NULL Pointer Dereference
| |
Out-of-bounds Write
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Incomplete Cleanup
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Comparison Using Wrong Factors
|
<0:5.14.0-70.26.1.rt21.98.el9_0
|
Use After Free
|
<0:5.14.0-70.17.1.rt21.89.el9_0
|
NULL Pointer Dereference
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Privilege Defined With Unsafe Actions
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Buffer Overflow
|
<0:5.14.0-70.26.1.rt21.98.el9_0
|
Out-of-bounds Write
| |
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
NULL Pointer Dereference
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Time-of-check Time-of-use (TOCTOU)
| |
Use After Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
|
<0:5.14.0-70.17.1.rt21.89.el9_0
|
NULL Pointer Dereference
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Race Condition
|
<0:5.14.0-70.17.1.rt21.89.el9_0
|
Race Condition
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Incorrect Default Permissions
|
<0:5.14.0-162.12.1.rt21.175.el9_1
|
Improper Cross-boundary Removal of Sensitive Data
| |
Race Condition
| |
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Information Exposure
|
<0:5.14.0-70.17.1.rt21.89.el9_0
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Improper Cross-boundary Removal of Sensitive Data
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Double Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Double Free
|
<0:5.14.0-284.11.1.rt14.296.el9_2
|
NULL Pointer Dereference
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-70.22.1.rt21.94.el9_0
|
Information Exposure
| |
Missing Initialization of Resource
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use After Free
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Heap-based Buffer Overflow
|
<0:5.14.0-70.17.1.rt21.89.el9_0
|
NULL Pointer Dereference
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Use of Uninitialized Resource
|
<0:5.14.0-70.22.1.rt21.94.el9_0
|
Memory Leak
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Information Exposure
| |
Memory Leak
| |
Authentication Bypass
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Out-of-bounds Write
| |
Improper Preservation of Permissions
| |
NULL Pointer Dereference
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Buffer Overflow
| |
Memory Leak
| |
Use of Uninitialized Resource
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|
Allocation of Resources Without Limits or Throttling
| |
Release of Invalid Pointer or Reference
| |
Out-of-Bounds
| |
Out-of-bounds Write
| |
Race Condition
|
<0:5.14.0-162.6.1.rt21.168.el9_1
|