kernel-zfcpdump-modules-core vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-zfcpdump-modules-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2024-27393

*
  • M
CVE-2024-27399

*
  • M
CVE-2024-27398

*
  • M
CVE-2024-27397

*
  • M
CVE-2024-27401

*
  • M
CVE-2024-27395

*
  • M
CVE-2024-21823

*
  • M
CVE-2023-52656

*
  • M
CVE-2023-52654

*
  • L
CVE-2024-27043

*
  • M
CVE-2024-26974

*
  • M
CVE-2022-48702

*
  • M
CVE-2022-48691

*
  • M
CVE-2022-48694

*
  • M
CVE-2022-48696

*
  • M
CVE-2022-48704

*
  • M
CVE-2022-48671

*
  • M
CVE-2022-48687

*
  • M
CVE-2022-48689

*
  • M
CVE-2022-48705

*
  • M
CVE-2022-48686

*
  • M
CVE-2022-48703

*
  • M
CVE-2022-48675

*
  • M
CVE-2022-48672

*
  • M
CVE-2022-48695

*
  • M
CVE-2022-48670

*
  • M
CVE-2022-48673

*
  • M
CVE-2022-48701

*
  • M
CVE-2022-48697

*
  • M
CVE-2022-48692

*
  • M
CVE-2022-48690

*
  • M
CVE-2022-48693

*
  • M
CVE-2022-48688

*
  • M
CVE-2024-27073

*
  • M
CVE-2024-27057

*
  • M
CVE-2024-27390

*
  • M
CVE-2024-27077

*
  • M
CVE-2024-27003

*
  • M
CVE-2024-27030

*
  • M
CVE-2024-27019

*
  • M
CVE-2024-27038

*
  • M
CVE-2024-27011

*
  • M
CVE-2024-27017

*
  • M
CVE-2024-27020

*
  • M
CVE-2024-27389

*
  • M
CVE-2024-27047

*
  • M
CVE-2024-26993

*
  • M
CVE-2024-27026

*
  • M
CVE-2024-27052

*
  • M
CVE-2024-27010

*
  • M
CVE-2024-26991

*
  • M
CVE-2024-27388

*
  • M
CVE-2024-27049

*
  • M
CVE-2024-27065

*
  • M
CVE-2024-27048

*
  • M
CVE-2024-27056

*
  • M
CVE-2024-27004

*
  • M
CVE-2024-27042

*
  • M
CVE-2024-27027

*
  • M
CVE-2024-26976

*
  • M
CVE-2024-27014

*
  • M
CVE-2024-26947

*
  • M
CVE-2024-27016

*
  • M
CVE-2024-26934

*
  • M
CVE-2024-26989

*
  • M
CVE-2024-27025

*
  • M
CVE-2024-27031

*
  • M
CVE-2024-27062

*
  • M
CVE-2024-27023

*
  • M
CVE-2024-26931

*
  • M
CVE-2024-26975

*
  • M
CVE-2024-27059

*
  • M
CVE-2024-27013

*
  • M
CVE-2024-26962

*
  • M
CVE-2024-26982

*
  • M
CVE-2024-27046

*
  • M
CVE-2024-26938

*
  • M
CVE-2024-26930

*
  • M
CVE-2024-27000

*
  • M
CVE-2024-26972

*
  • M
CVE-2024-27079

*
  • M
CVE-2024-26984

*
  • M
CVE-2024-27050

*
  • M
CVE-2024-27055

*
  • M
CVE-2024-27002

*
  • M
CVE-2024-26992

*
  • M
CVE-2024-27012

*
  • M
CVE-2024-26988

*
  • M
CVE-2024-27022

*
  • M
CVE-2024-26961

*
  • M
CVE-2024-26973

*
  • M
CVE-2024-26999

*
  • M
CVE-2024-26953

*
  • M
CVE-2024-26990

*
  • M
CVE-2024-26950

*
  • M
CVE-2024-26951

*
  • M
CVE-2024-26958

*
  • M
CVE-2024-26933

*
  • M
CVE-2024-27039

*
  • M
CVE-2024-26945

*
  • M
CVE-2024-26960

*
  • M
CVE-2024-26979

*
  • M
CVE-2024-26987

*
  • M
CVE-2024-27015

*
  • M
CVE-2024-26937

*
  • M
CVE-2024-26939

*
  • M
CVE-2024-26946

*
  • M
CVE-2024-26964

*
  • M
CVE-2024-26929

*
  • M
CVE-2024-26935

*
  • M
CVE-2024-26940

*
  • M
CVE-2023-52651

*
  • M
CVE-2023-52650

*
  • M
CVE-2023-52653

*
  • M
CVE-2023-52649

*
  • M
CVE-2023-52648

*
  • M
CVE-2022-48669

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • L
Race Condition

*
  • M
Deadlock

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
CVE-2024-26927

*
  • M
CVE-2023-52646

*
  • M
CVE-2022-48643

*
  • M
CVE-2022-48660

*
  • M
CVE-2022-48666

*
  • M
CVE-2022-48651

*
  • M
CVE-2022-48662

*
  • M
CVE-2022-48663

*
  • M
CVE-2022-48657

*
  • M
CVE-2022-48654

*
  • M
CVE-2022-48653

*
  • M
CVE-2022-48652

*
  • M
CVE-2022-48641

*
  • M
CVE-2022-48659

*
  • M
CVE-2022-48648

*
  • M
CVE-2022-48650

*
  • M
CVE-2022-48658

*
  • M
CVE-2022-48646

*
  • M
CVE-2022-48647

*
  • M
CVE-2022-48644

*
  • M
CVE-2022-48638

*
  • M
CVE-2022-48642

*
  • M
CVE-2022-48649

*
  • M
CVE-2022-48632

*
  • M
CVE-2022-48631

*
  • M
CVE-2022-48640

*
  • M
CVE-2022-48637

*
  • M
CVE-2022-48639

*
  • M
CVE-2022-48635

*
  • M
Integer Underflow

*
  • M
Resource Leak

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Race Condition

*
  • M
Improper Locking

*
  • L
Improper Input Validation

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
CVE-2024-26921

*
  • M
CVE-2024-26919

*
  • M
Race Condition

*
  • M
Resource Injection

*
  • M
CVE-2024-26915

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Incomplete Cleanup

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • L
Stack-based Buffer Overflow

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • L
Unchecked Return Value to NULL Pointer Dereference

*
  • M
CVE-2024-26920

*
  • M
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Race Condition

*
  • M
CVE-2024-26918

*
  • L
Data Element containing Pointer Item without Proper Copy Control Element

*
  • L
Improper Resource Locking

*
  • L
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Resource Leak

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • L
Improper Input Validation

*
  • L
Excessive Platform Resource Consumption within a Loop

*
  • M
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
CVE-2024-26782

*
  • M
CVE-2024-26786

*
  • M
CVE-2024-26783

*
  • L
Resource Injection

*
  • M
CVE-2024-26803

*
  • M
Use After Free

*
  • M
CVE-2024-26785

*
  • M
CVE-2024-26804

*
  • M
CVE-2024-26801

*
  • L
Deadlock

*
  • M
Improper Input Validation

*
  • M
Improper Handling of Values

*
  • L
Divide By Zero

*
  • M
Improper Handling of Values

*
  • M
Incomplete Cleanup

*
  • M
Improper Null Termination

*
  • M
Race Condition

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Divide By Zero

*
  • M
Race Condition

*
  • M
Improper Null Termination

*
  • L
Deadlock

*
  • L
Unchecked Input for Loop Condition

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • L
Deadlock

*
  • M
Deadlock

*
  • M
Double Free

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Improper Null Termination

*
  • M
Divide By Zero

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Race Condition

*
  • M
Improper Handling of Undefined Parameters

*
  • L
Race Condition

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Unchecked Input for Loop Condition

*
  • M
Improper Protection Against Physical Side Channels

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Resource Leak

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Integer Overflow or Wraparound

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Missing Lock Check

*
  • L
Improper Locking

*
  • M
Integer Underflow

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Improper Resource Locking

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • L
Missing Initialization of a Variable

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Missing Lock Check

*
  • M
Resource Injection

*
  • M
Deadlock

*
  • L
Stack-based Buffer Overflow

*
  • M
Unchecked Input for Loop Condition

*
  • L
Memory Leak

*
  • M
Return of Wrong Status Code

*
  • M
Use After Free

*
  • M
Use of NullPointerException Catch to Detect NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Deadlock

*
  • M
Deadlock

*
  • L
Improper Resource Locking

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • M
Return of Stack Variable Address

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Resource Locking

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • L
Use of Uninitialized Variable

*
  • M
Use After Free

*
  • L
Double Free

*
  • M
Improper Input Validation

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Leak

*
  • M
Improper Resource Locking

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52575

*
  • M
CVE-2023-52520

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • M
Memory Leak

*
  • M
Resource Injection

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • L
Missing Encryption of Sensitive Data

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
CVE-2024-26615

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • M
Deadlock

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2021-47018

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Untrusted Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • M
Resource Leak

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • L
Stack-based Buffer Overflow

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • M
Range Error

*
  • M
Improper Input Validation

*
  • L
CVE-2021-46914

*
  • L
Missing Support for Integrity Check

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Unchecked Error Condition

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • L
CVE-2023-52474

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Range Error

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Untrusted Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52462

*
  • L
Use After Free

*
  • M
CVE-2023-52455

*
  • M
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-26581

*
  • M
Use After Free

*
  • M
Improper Authentication

*
  • M
Memory Leak

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
CVE-2024-25744

*
  • M
CVE-2024-25741

*
  • M
Stack-based Buffer Overflow

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Information Exposure

*
  • H
Integer Overflow or Wraparound

<0:5.14.0-284.11.1.el9_2
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Improper Handling of Values

*
  • M
Resource Leak

*
  • L
Information Exposure

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • H
Out-of-Bounds

<0:5.14.0-284.30.1.el9_2
  • L
Use After Free

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Improper Zeroization of Hardware Register

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • M
Information Exposure

*
  • H
Out-of-bounds Read

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Improper Resource Locking

<0:5.14.0-284.30.1.el9_2
  • M
Divide By Zero

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Sensitive Information Uncleared Before Release

*
  • M
Reachable Assertion

*
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
Execution with Unnecessary Privileges

<0:5.14.0-284.18.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
Exposure of Resource to Wrong Sphere

<0:5.14.0-284.11.1.el9_2
  • M
Improper Update of Reference Count

*
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-bounds Read

<0:5.14.0-284.18.1.el9_2
  • M
Use After Free

*
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.25.1.el9_2
  • M
Use After Free

*
  • H
Interpretation Conflict

<0:5.14.0-284.11.1.el9_2
  • H
Sensitive Information Uncleared Before Release

<0:5.14.0-284.30.1.el9_2
  • M
Out-of-bounds Read

*
  • L
Improper Initialization

*
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • M
NULL Pointer Dereference

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • M
CVE-2022-27672

*
  • M
Use After Free

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • L
Externally Controlled Reference to a Resource in Another Sphere

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Write-what-where Condition

<0:5.14.0-284.11.1.el9_2
  • L
Use After Free

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Insecure Default Initialization of Resource

<0:5.14.0-284.11.1.el9_2
  • L
Memory Leak

*
  • H
Non-exit on Failed Initialization

<0:5.14.0-284.11.1.el9_2
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • H
Memory Leak

<0:5.14.0-284.11.1.el9_2
  • L
Memory Leak

*
  • L
Memory Leak

*
  • H
Race Condition

<0:5.14.0-284.25.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • H
Memory Leak

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • M
Race Condition

*
  • M
Improper Locking

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition During Access to Alternate Channel

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Authentication Bypass by Primary Weakness

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • L
Expected Behavior Violation

*
  • H
Incorrect Control Flow Scoping

<0:5.14.0-284.11.1.el9_2
  • H
Improper Input Validation

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • M
Use After Free

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • M
Out-of-bounds Read

*
  • H
Expected Behavior Violation

<0:5.14.0-284.11.1.el9_2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • L
Out-of-bounds Read

*
  • H
Improper Update of Reference Count

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Incomplete Cleanup

<0:5.14.0-284.11.1.el9_2
  • M
Out-of-bounds Write

*
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Race Condition

*
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • M
Improper Preservation of Permissions

*
  • L
Buffer Overflow

*
  • M
Memory Leak

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Out-of-Bounds

*
  • M
Race Condition

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • M
Out-of-Bounds

*
  • M
Insufficient Comparison

*
  • L
Information Exposure

*
  • M
Use After Free

*
  • M
Improper Initialization

*
  • L
Incorrect Authorization

*
  • M
Information Exposure

*
  • L
Improper Cleanup on Thrown Exception

*
  • M
Authentication Bypass

*
  • L
Incorrect Check of Function Return Value

*