kernel-debug-uki-virt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debug-uki-virt package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Use After Free

<0:5.14.0-503.14.1.el9_5
  • M
NULL Pointer Dereference

<0:5.14.0-503.14.1.el9_5
  • M
Use of Uninitialized Resource

<0:5.14.0-503.14.1.el9_5
  • H
CVE-2024-26671

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-26633

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-26609

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-26602

<0:5.14.0-427.13.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
Out-of-bounds Write

<0:5.14.0-427.13.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • H
Improper Handling of Exceptional Conditions

<0:5.14.0-427.13.1.el9_4
  • M
Integer Overflow or Wraparound

<0:5.14.0-427.35.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
Divide By Zero

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-42096

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-25744

<0:5.14.0-427.13.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
Double Free

<0:5.14.0-427.35.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
Improper Initialization

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41044

<0:5.14.0-427.35.1.el9_4
  • H
Integer Underflow

<0:5.14.0-427.13.1.el9_4
  • M
Memory Leak

<0:5.14.0-427.42.1.el9_4
  • H
Memory Leak

<0:5.14.0-427.33.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-41014

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-42110

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-40936

<0:5.14.0-427.35.1.el9_4
  • H
Out-of-bounds Write

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-41013

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-41091

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-40927

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-41005

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-41090

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-38619

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-40998

<0:5.14.0-427.42.1.el9_4
  • H
Memory Leak

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-38559

<0:5.14.0-427.35.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-427.42.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-41041

<0:5.14.0-427.33.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
Improper Locking

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-36883

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-40983

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-40972

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-36019

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-40978

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-36000

<0:5.14.0-427.35.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-35875

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-40931

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-40941

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2023-52620

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-35797

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-40904

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52610

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-40939

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-35791

<0:5.14.0-427.35.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52597

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-26946

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-40929

<0:5.14.0-427.33.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52581

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-26886

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-40914

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-36244

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52580

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-26720

<0:5.14.0-427.35.1.el9_4
  • H
Improper Locking

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26961

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26630

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52578

<0:5.14.0-427.13.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26935

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26629

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52574

<0:5.14.0-427.13.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26923

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2023-52801

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52529

<0:5.14.0-427.13.1.el9_4
  • H
Improper Locking

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26826

<0:5.14.0-427.42.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52522

<0:5.14.0-427.13.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26640

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52489

<0:5.14.0-427.13.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38579

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-2201

<0:5.14.0-427.42.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-52476

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-38544

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2021-47383

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-40928

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38540

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-38575

<0:5.14.0-427.31.1.el9_4
  • H
Use of Uninitialized Resource

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-38558

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-Bounds

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36025

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-38391

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-37356

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36003

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2023-51779

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-37353

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35962

<0:5.14.0-427.33.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36941

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35898

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36929

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35897

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Write

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36922

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35896

<0:5.14.0-427.33.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36921

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36903

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35839

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-27415

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-36020

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
Race Condition

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-36017

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36005

<0:5.14.0-427.31.1.el9_4
  • H
Race Condition

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-35969

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-27016

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-35937

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-26925

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-35911

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35899

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35852

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26855

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-35848

<0:5.14.0-427.31.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-38580

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35845

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26810

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-36952

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35823

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26668

<0:5.14.0-427.33.1.el9_4
  • H
Double Free

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-36924

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35800

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26581

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2023-25775

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35789

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-35907

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-38663

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2023-52880

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-33621

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-24023

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-35885

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-38593

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-27434

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-52771

<0:5.14.0-427.33.1.el9_4
  • H
Integer Overflow or Wraparound

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-35857

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-38586

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-27417

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-27065

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-27046

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-27052

<0:5.14.0-427.31.1.el9_4
  • H
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36957

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-27030

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-27049

<0:5.14.0-427.31.1.el9_4
  • H
Incorrect Authorization

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36904

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-26982

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-26897

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36886

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26868

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-26880

<0:5.14.0-427.28.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26853

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-26852

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-26828

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35958

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-26773

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-26808

<0:5.14.0-427.31.1.el9_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2024-27435

<0:5.14.0-427.26.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-26737

<0:5.14.0-427.28.1.el9_4
  • H
Use of Uninitialized Resource

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2024-27397

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-21823

<0:5.14.0-427.31.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-35890

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2024-26858

<0:5.14.0-427.26.1.el9_4
  • H
Improper Validation of Array Index

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2023-52864

<0:5.14.0-427.31.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-26783

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-26804

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2024-40984

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2023-52651

<0:5.14.0-427.31.1.el9_4
  • H
Divide By Zero

<0:5.14.0-427.31.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2023-52638

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-38615

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-26673

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2022-48627

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2021-47459

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-38601

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-26643

<0:5.14.0-427.18.1.el9_4
  • H
Use After Free

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-38573

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-26642

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2021-47548

<0:5.14.0-427.26.1.el9_4
  • H
Use After Free

<0:5.14.0-427.37.1.el9_4
  • H
Improper Validation of Array Index

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-35960

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-36899

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-35870

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-36016

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-27393

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-26974

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-35895

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-26801

<0:5.14.0-427.24.1.el9_4
  • H
Use of Uninitialized Resource

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2023-52667

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-26991

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2023-52626

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2021-47400

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-26947

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2024-26931

<0:5.14.0-427.37.1.el9_4
  • H
Double Free

<0:5.14.0-427.37.1.el9_4
  • H
Double Free

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2024-26739

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2023-52884

<0:5.14.0-427.37.1.el9_4
  • H
Double Free

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-25743

<0:5.14.0-427.16.1.el9_4
  • M
CVE-2024-25742

<0:5.14.0-427.16.1.el9_4
  • M
Information Exposure

<0:5.14.0-427.16.1.el9_4
  • M
Improper Handling of Exceptional Conditions

<0:5.14.0-427.16.1.el9_4
  • M
CVE-2024-26993

<0:5.14.0-427.20.1.el9_4
  • M
CVE-2024-26735

<0:5.14.0-427.20.1.el9_4
  • M
Improper Check for Unusual or Exceptional Conditions

<0:5.14.0-427.40.1.el9_4
  • M
Use of Uninitialized Resource

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39502

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39483

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-38556

<0:5.14.0-427.40.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-36889

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-35989

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-27403

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-52658

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-28746

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2021-47385

<0:5.14.0-427.40.1.el9_4
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.el9_2
  • H
CVE-2023-21102

<0:5.14.0-284.30.1.el9_2
  • H
CVE-2023-20593

<0:5.14.0-284.30.1.el9_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-284.30.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.el9_2
  • H
Information Exposure

<0:5.14.0-284.25.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.el9_2
  • H
Race Condition

<0:5.14.0-284.25.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.18.1.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.el9_2
  • H
Incorrect Authorization

<0:5.14.0-284.18.1.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • H
CVE-2022-33743

<0:5.14.0-284.11.1.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • H
CVE-2022-21505

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.el9_2
  • H
CVE-2022-39189

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
Memory Leak

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
Improper Resource Shutdown or Release

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:5.14.0-284.11.1.el9_2
  • H
Insecure Default Initialization of Resource

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.el9_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-284.11.1.el9_2