kernel-debug-modules vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debug-modules package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-38564

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-27399

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-27043

<0:4.18.0-553.30.1.el8_10
  • M
Race Condition

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-46826

<0:4.18.0-553.27.1.el8_10
  • M
Improper Initialization

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43892

<0:4.18.0-553.27.1.el8_10
  • M
Divide By Zero

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43880

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
Improper Validation of Array Index

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42292

<0:4.18.0-553.27.1.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42244

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-41042

<0:4.18.0-553.27.1.el8_10
  • M
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40984

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40983

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-39503

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38586

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38541

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38540

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35939

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35898

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35839

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27062

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27017

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26976

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26851

<0:4.18.0-553.27.1.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2023-52492

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2022-48936

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-43830

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42322

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42265

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
Excessive Iteration

<0:4.18.0-553.22.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.22.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Integer Overflow or Wraparound

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42124

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42096

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42084

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41097

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41091

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41090

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41065

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41064

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41056

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41044

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41041

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41035

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41023

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41014

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41013

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41008

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41007

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41005

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40998

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40989

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40988

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40978

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40972

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40941

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40931

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40929

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40904

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40901

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-39501

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-39499

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38619

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38579

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38559

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38558

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-37356

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36953

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36939

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36922

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36920

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36919

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36883

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35989

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35944

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35884

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35877

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35809

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-27042

<0:4.18.0-553.22.1.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26939

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26923

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26894

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26880

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26855

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26846

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26769

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26720

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26717

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26665

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26649

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26645

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26638

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52840

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52800

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52798

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52683

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52605

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52522

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52478

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52476

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48836

<0:4.18.0-553.22.1.el8_10
  • H
Integer Underflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48760

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48754

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48619

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47582

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47560

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47527

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47497

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47466

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47455

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47441

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47432

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47412

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47393

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47386

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47385

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47384

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47383

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47352

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47338

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47321

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47289

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47287

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47101

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47097

<0:4.18.0-553.22.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40974

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-40927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-39502

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-39276

<0:4.18.0-553.16.1.el8_10
  • H
Double Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38615

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38596

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38575

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38573

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36960

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36954

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36950

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36945

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36941

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36940

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36933

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36929

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36921

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36917

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36905

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36904

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36896

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36889

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36886

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36286

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36025

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36020

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36017

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36016

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36010

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36006

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36005

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36000

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35952

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35947

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35946

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35938

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35937

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35930

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35924

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35912

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35910

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35900

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35899

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35897

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35896

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35893

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35876

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35847

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35824

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35814

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35810

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35807

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35801

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35790

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-33621

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-31076

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27434

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27395

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27388

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27065

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27025

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27011

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27010

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26961

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26960

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26958

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26940

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26921

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26878

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26870

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26853

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26852

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26843

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26840

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26837

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26810

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26802

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26773

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26772

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26740

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26733

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26704

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26698

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26686

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26669

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26660

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26640

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26614

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-2201

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-21823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52864

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52847

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52845

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52834

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52832

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52811

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52803

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52796

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52791

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52784

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52777

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52775

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52764

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52762

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52756

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52730

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52707

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52679

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52662

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52658

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52653

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52648

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52623

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52622

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52619

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52486

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-28746

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48757

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48747

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48632

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47624

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47579

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47548

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47491

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47468

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47461

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47408

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47373

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47304

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47284

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47257

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47018

<0:4.18.0-553.16.1.el8_10
  • H
Improper Synchronization

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36007

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-36004

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35960

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35959

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35958

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35890

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35888

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35855

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35854

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35853

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35852

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35845

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35838

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35835

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35789

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-27410

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-27397

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26982

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26974

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26907

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26906

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26859

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26826

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26804

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26801

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26759

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26735

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26675

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26656

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52881

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52878

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52877

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52835

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52813

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52781

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52703

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52700

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52686

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52675

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52669

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52667

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52626

<0:4.18.0-553.8.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.8.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.8.1.el8_10
  • H
Out-of-Bounds

<0:4.18.0-553.8.1.el8_10
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47495

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47456

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47356

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47353

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47311

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47310

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47236

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47073

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47069

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-46972

<0:4.18.0-553.8.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
Incorrect Authorization

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-27059

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27056

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27052

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27048

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26993

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26973

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26964

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26919

<0:4.18.0-553.5.1.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26897

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26892

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26872

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26779

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26744

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26743

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26694

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26693

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26664

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26659

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26643

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26642

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.5.1.el8_10
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-25744

<0:4.18.0-553.5.1.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-0340

<0:4.18.0-553.5.1.el8_10
  • M
Information Exposure

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52610

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52607

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52606

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52598

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
Improper Validation of Array Index

<0:4.18.0-553.5.1.el8_10
  • M
Race Condition

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52520

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
Double Free

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2022-48669

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2022-48627

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47185

<0:4.18.0-553.5.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47153

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47118

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47055

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.5.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26671

<0:4.18.0-553.el8_10
  • M
CVE-2024-26609

<0:4.18.0-553.el8_10
  • M
CVE-2024-26602

<0:4.18.0-553.el8_10
  • M
CVE-2024-25743

<0:4.18.0-553.el8_10
  • M
CVE-2024-25742

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2023-52620

<0:4.18.0-553.el8_10
  • M
CVE-2023-52581

<0:4.18.0-553.el8_10
  • M
CVE-2023-52580

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
CVE-2023-52489

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • M
CVE-2023-52340

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2023-51779

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2023-38409

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Race Condition

<0:4.18.0-553.el8_10
  • M
Double Free

<0:4.18.0-553.el8_10
  • M
CVE-2023-25775

<0:4.18.0-553.el8_10
  • M
CVE-2023-24023

<0:4.18.0-553.el8_10
  • M
Improper Initialization

<0:4.18.0-553.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.el8_10
  • M
Improper Synchronization

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
Integer Underflow

<0:4.18.0-513.24.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.24.1.el8_9
  • H
Race Condition

<0:4.18.0-513.24.1.el8_9
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.24.1.el8_9
  • H
Integer Overflow or Wraparound

<0:4.18.0-513.24.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
CVE-2023-46813

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-Bounds

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.11.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.11.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Incorrect Calculation

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-35825

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Incorrect Calculation

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-31084

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-30456

<0:4.18.0-513.5.1.el8_9
  • H
Buffer Overflow

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Resource Exhaustion

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Access of Uninitialized Pointer

<0:4.18.0-513.5.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-Bounds

<0:4.18.0-513.5.1.el8_9
  • H
Improper Resource Shutdown or Release

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-477.27.2.el8_8
  • H
Use After Free

<0:4.18.0-477.27.2.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.2.el8_8
  • H
Use After Free

<0:4.18.0-477.27.2.el8_8
  • H
CVE-2023-20593

<0:4.18.0-477.27.2.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.2.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.2.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.15.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Incorrect Authorization

<0:4.18.0-477.27.2.el8_8
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Incorrect Type Conversion or Cast

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-43976

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-43056

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-3773

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Double Free

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.9.1.el8
  • H
Arbitrary Command Injection

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
CVE-2020-4788

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Improper Privilege Management

<0:4.18.0-372.9.1.el8
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.32.1.el8_6
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • H
Double Free

<0:4.18.0-372.32.1.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.32.1.el8_6
  • H
CVE-2022-23816

<0:4.18.0-372.32.1.el8_6
  • H
CVE-2022-1353

<0:4.18.0-372.32.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-29581

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-26373

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Improper Handling of Exceptional Conditions

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-20368

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
CVE-2022-39189

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Improper Resource Shutdown or Release

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Missing Authorization

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Improper Control of Dynamically-Managed Code Resources

<0:4.18.0-477.10.1.el8_8
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-477.10.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • M
Stack-based Buffer Overflow

<0:4.18.0-425.3.1.el8
  • H
CVE-2023-0386

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Memory Leak

<0:4.18.0-425.10.1.el8_7
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • H
Out-of-bounds Write

<0:4.18.0-425.19.2.el8_7
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Out-of-bounds Write

<0:4.18.0-372.13.1.el8_6
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.19.1.el8_6