kernel-rt-debug-core vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-rt-debug-core package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-50251

<0:5.14.0-503.16.1.el9_5
  • M
NULL Pointer Dereference

<0:5.14.0-503.16.1.el9_5
  • M
Incorrect Default Permissions

<0:5.14.0-503.16.1.el9_5
  • M
CVE-2024-44994

<0:5.14.0-503.16.1.el9_5
  • M
NULL Pointer Dereference

<0:5.14.0-503.16.1.el9_5
  • M
Use After Free

<0:5.14.0-503.15.1.el9_5
  • M
CVE-2024-42244

<0:5.14.0-503.15.1.el9_5
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-503.15.1.el9_5
  • M
Use After Free

<0:5.14.0-503.14.1.el9_5
  • M
NULL Pointer Dereference

<0:5.14.0-503.14.1.el9_5
  • M
Use of Uninitialized Resource

<0:5.14.0-503.14.1.el9_5
  • H
CVE-2024-26671

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-26633

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-26609

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-26602

<0:5.14.0-427.13.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
Out-of-bounds Write

<0:5.14.0-427.13.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • H
Improper Handling of Exceptional Conditions

<0:5.14.0-427.13.1.el9_4
  • M
Integer Overflow or Wraparound

<0:5.14.0-427.35.1.el9_4
  • M
Divide By Zero

<0:5.14.0-427.35.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-42096

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-25744

<0:5.14.0-427.13.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
Double Free

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
Improper Initialization

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41044

<0:5.14.0-427.35.1.el9_4
  • H
Integer Underflow

<0:5.14.0-427.13.1.el9_4
  • M
Memory Leak

<0:5.14.0-427.42.1.el9_4
  • H
Memory Leak

<0:5.14.0-427.33.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-41014

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40936

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-42110

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Write

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-41013

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40927

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-41091

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-41005

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-38619

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2024-41090

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-38559

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-40998

<0:5.14.0-427.42.1.el9_4
  • H
Memory Leak

<0:5.14.0-427.33.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-41041

<0:5.14.0-427.33.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-36883

<0:5.14.0-427.35.1.el9_4
  • M
Improper Locking

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-40983

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-36019

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-40972

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-40978

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-36000

<0:5.14.0-427.35.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-35875

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-40931

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-35797

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52620

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-40941

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-40904

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-35791

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52610

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-40939

<0:5.14.0-427.33.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26946

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52597

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-40929

<0:5.14.0-427.33.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26886

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52581

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-40914

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-36244

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26720

<0:5.14.0-427.35.1.el9_4
  • H
CVE-2023-52580

<0:5.14.0-427.13.1.el9_4
  • H
Improper Locking

<0:5.14.0-427.33.1.el9_4
  • M
Use After Free

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26630

<0:5.14.0-427.35.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26629

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26935

<0:5.14.0-427.42.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2023-52801

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26923

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52529

<0:5.14.0-427.13.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • H
Improper Locking

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26826

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52522

<0:5.14.0-427.13.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-26640

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2023-52489

<0:5.14.0-427.13.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38579

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-2201

<0:5.14.0-427.42.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-52476

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-38544

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2021-47383

<0:5.14.0-427.42.1.el9_4
  • H
CVE-2024-40928

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38540

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-38575

<0:5.14.0-427.31.1.el9_4
  • H
Use of Uninitialized Resource

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-38558

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-Bounds

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36025

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-38391

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-37356

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36003

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2023-51779

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-37353

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35962

<0:5.14.0-427.33.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36941

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35898

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36929

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Write

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35897

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-36922

<0:5.14.0-427.31.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36921

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35896

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-36903

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35839

<0:5.14.0-427.33.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-27415

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-36020

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36017

<0:5.14.0-427.31.1.el9_4
  • H
Race Condition

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-36005

<0:5.14.0-427.31.1.el9_4
  • H
Race Condition

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-35969

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-27016

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-35937

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35911

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26925

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35899

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.33.1.el9_4
  • H
Use After Free

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-35852

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26855

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-35848

<0:5.14.0-427.31.1.el9_4
  • H
Race Condition

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-38580

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35845

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26810

<0:5.14.0-427.33.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-36952

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35823

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26668

<0:5.14.0-427.33.1.el9_4
  • H
Double Free

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-36924

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35800

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26581

<0:5.14.0-427.33.1.el9_4
  • H
CVE-2024-38663

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2023-25775

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-35907

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35789

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-33621

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38593

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2023-24023

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2023-52880

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-35885

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-27434

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38586

<0:5.14.0-427.26.1.el9_4
  • H
Integer Overflow or Wraparound

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2023-52771

<0:5.14.0-427.33.1.el9_4
  • M
CVE-2024-35857

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-27417

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.13.1.el9_4
  • H
CVE-2024-27065

<0:5.14.0-427.31.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-36957

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-27052

<0:5.14.0-427.31.1.el9_4
  • H
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.13.1.el9_4
  • M
Race Condition

<0:5.14.0-427.28.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36904

<0:5.14.0-427.26.1.el9_4
  • H
Incorrect Authorization

<0:5.14.0-427.13.1.el9_4
  • M
CVE-2024-26982

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-26897

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36886

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26868

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-26880

<0:5.14.0-427.28.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26853

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-26852

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-35958

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26828

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-26773

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-27435

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26808

<0:5.14.0-427.31.1.el9_4
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-427.37.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27397

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-26737

<0:5.14.0-427.28.1.el9_4
  • H
Use of Uninitialized Resource

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2024-21823

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26858

<0:5.14.0-427.26.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • H
Improper Validation of Array Index

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-35890

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2023-52864

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26783

<0:5.14.0-427.26.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2023-52651

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-40984

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-26804

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2023-52638

<0:5.14.0-427.26.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.28.1.el9_4
  • H
Divide By Zero

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38615

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-26673

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2022-48627

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2021-47459

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-38601

<0:5.14.0-427.37.1.el9_4
  • H
Use After Free

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-26643

<0:5.14.0-427.18.1.el9_4
  • H
CVE-2024-38573

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2021-47548

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-26642

<0:5.14.0-427.18.1.el9_4
  • H
Use After Free

<0:5.14.0-427.37.1.el9_4
  • H
Improper Validation of Array Index

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-35960

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-36899

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-35870

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-36016

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-27393

<0:5.14.0-427.24.1.el9_4
  • M
Time-of-check Time-of-use (TOCTOU)

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-35895

<0:5.14.0-427.37.1.el9_4
  • M
Use After Free

<0:5.14.0-427.24.1.el9_4
  • H
Use of Uninitialized Resource

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2023-52667

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-26991

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2023-52626

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2021-47400

<0:5.14.0-427.24.1.el9_4
  • H
CVE-2024-26947

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2024-26931

<0:5.14.0-427.37.1.el9_4
  • H
Double Free

<0:5.14.0-427.37.1.el9_4
  • H
Double Free

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2024-26739

<0:5.14.0-427.37.1.el9_4
  • H
CVE-2023-52884

<0:5.14.0-427.37.1.el9_4
  • H
Double Free

<0:5.14.0-427.37.1.el9_4
  • M
CVE-2024-25743

<0:5.14.0-427.16.1.el9_4
  • M
CVE-2024-25742

<0:5.14.0-427.16.1.el9_4
  • M
Information Exposure

<0:5.14.0-427.16.1.el9_4
  • M
Improper Handling of Exceptional Conditions

<0:5.14.0-427.16.1.el9_4
  • M
CVE-2024-26993

<0:5.14.0-427.20.1.el9_4
  • M
CVE-2024-26735

<0:5.14.0-427.20.1.el9_4
  • M
Improper Check for Unusual or Exceptional Conditions

<0:5.14.0-427.40.1.el9_4
  • M
Use of Uninitialized Resource

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39502

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39483

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-38556

<0:5.14.0-427.40.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-36889

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-35989

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-27403

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-52658

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-28746

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
CVE-2023-21102

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
CVE-2023-20593

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Information Exposure

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Race Condition

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Incorrect Authorization

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.rt14.303.el9_2
  • M
CVE-2022-39190

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Exposure of Resource to Wrong Sphere

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Exposure of Resource to Wrong Sphere

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-23816

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-1353

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-36946

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-29581

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Double Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incorrect Conversion between Numeric Types

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-26373

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Improper Handling of Exceptional Conditions

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Out-of-bounds Write

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-20368

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Race Condition

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Missing Initialization of Resource

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Memory Leak

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Race Condition

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Buffer Overflow

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Race Condition

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
CVE-2022-33743

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
CVE-2022-21505

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-70.30.1.rt21.102.el9_0
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
CVE-2022-39189

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Memory Leak

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Resource Shutdown or Release

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Missing Authorization

<0:5.14.0-70.30.1.rt21.102.el9_0
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Insecure Default Initialization of Resource

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Double Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.14.0-162.12.1.rt21.175.el9_1
  • M
Use After Free

<0:5.14.0-70.22.1.rt21.94.el9_0
  • M
Use of Uninitialized Resource

<0:5.14.0-70.22.1.rt21.94.el9_0
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:5.14.0-70.26.1.rt21.98.el9_0
  • H
Stack-based Buffer Overflow

<0:5.14.0-70.26.1.rt21.98.el9_0
  • H
CVE-2023-0386

<0:5.14.0-162.23.1.rt21.186.el9_1
  • H
Use After Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Deadlock

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Memory Leak

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Out-of-Bounds

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Integer Overflow or Wraparound

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Use After Free

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Out-of-bounds Write

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Race Condition

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Incorrect Calculation of Buffer Size

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Out-of-bounds Write

<0:5.14.0-70.17.1.rt21.89.el9_0
  • H
Use After Free

<0:5.14.0-70.17.1.rt21.89.el9_0
  • H
Race Condition

<0:5.14.0-70.17.1.rt21.89.el9_0
  • H
Memory Leak

<0:5.14.0-70.17.1.rt21.89.el9_0