kernel-debuginfo-common-x86_64 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debuginfo-common-x86_64 package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Improper Input Validation

<0:4.14.352-267.564.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46780

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
Race Condition

<0:4.14.352-267.564.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46745

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Link Following

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46840

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Out-of-bounds Read

<0:4.14.355-271.569.amzn2
  • M
NULL Pointer Dereference

<0:4.14.352-268.569.amzn2
  • M
Race Condition During Access to Alternate Channel

<0:4.14.350-266.564.amzn2
  • H
Incomplete Cleanup

<0:4.14.349-266.564.amzn2
  • M
Race Condition

<0:4.14.350-266.564.amzn2
  • H
CVE-2024-35849

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35960

<0:4.14.348-265.562.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.238-182.421.amzn2
  • M
Memory Leak

<0:4.14.353-270.569.amzn2
  • M
Resource Leak

<0:4.14.353-270.569.amzn2
  • H
Use After Free

<0:4.14.352-268.568.amzn2
  • H
CVE-2024-35815

<0:4.14.345-262.561.amzn2
  • M
CVE-2024-35807

<0:4.14.336-257.566.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-35925

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35847

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-27413

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52691

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52675

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.273-207.502.amzn2
  • H
Double Free

<0:4.14.273-207.502.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • M
Use of Uninitialized Variable

<0:4.14.350-266.564.amzn2
  • M
Use After Free

<0:4.14.350-266.564.amzn2
  • M
Deadlock

<0:4.14.350-266.564.amzn2
  • M
Information Exposure

<0:4.14.350-266.564.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • H
Improper Input Validation

<0:4.14.348-265.562.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • M
CVE-2024-27388

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26764

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26805

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26920

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Divide By Zero

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Length Parameter Inconsistency

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • M
Double Free

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • H
Off-by-one Error

<0:4.14.296-222.539.amzn2
  • H
CVE-2022-48695

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-48704

<0:4.14.294-220.533.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.273-207.502.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Integer Underflow

<0:4.14.268-205.500.amzn2
  • M
Improper Input Validation

<0:4.14.256-197.484.amzn2
  • M
Incorrect Synchronization

<0:4.14.256-197.484.amzn2
  • M
Excessive Platform Resource Consumption within a Loop

<0:4.14.256-197.484.amzn2
  • M
NULL Pointer Dereference

<0:4.14.256-197.484.amzn2
  • H
Use After Free

<0:4.14.349-266.564.amzn2
  • H
Improper Input Validation

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-26931

<0:4.14.345-262.561.amzn2
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.14.345-262.561.amzn2
  • H
Out-of-bounds Read

<0:4.14.349-266.564.amzn2
  • H
Double Free

<0:4.14.349-266.564.amzn2
  • H
Improper Locking

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-27059

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26955

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26976

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26956

<0:4.14.345-262.561.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Incomplete Cleanup

<0:4.14.348-265.565.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-26981

<0:4.14.348-265.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • H
Race Condition

<0:4.14.328-248.540.amzn2
  • M
Use After Free

<0:4.14.327-246.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.327-246.539.amzn2
  • M
Improper Input Validation

<0:4.14.327-246.539.amzn2
  • M
Unchecked Return Value

<0:4.14.327-246.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Reachable Assertion

<0:4.14.296-222.539.amzn2
  • H
Resource Exhaustion

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Missing Synchronization

<0:4.14.268-205.500.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Buffer Underflow

<0:4.14.268-205.500.amzn2
  • H
Divide By Zero

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Deadlock

<0:4.14.262-200.489.amzn2
  • H
Improper Update of Reference Count

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Double Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
CVE-2021-47055

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Improper Access Control

<0:4.14.59-68.43.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
Double Free

<0:4.14.348-265.562.amzn2
  • H
NULL Pointer Dereference

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35947

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • H
Divide By Zero

<0:4.14.348-265.562.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.348-265.565.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.344-262.563.amzn2
  • H
Use After Free

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Write

<0:4.14.348-265.562.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Read

<0:4.14.348-265.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Missing Initialization of a Variable

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Stack-based Buffer Overflow

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Information Exposure

<0:4.14.343-259.562.amzn2
  • M
Resource Exhaustion

<0:4.14.343-259.562.amzn2
  • H
CVE-2024-23851

<0:4.14.336-257.562.amzn2
  • H
Deadlock

<0:4.14.334-252.552.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improperly Implemented Security Check for Standard

<0:4.14.348-265.562.amzn2
  • H
Resource Injection

<0:4.14.348-265.562.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.330-250.540.amzn2
  • H
Use After Free

<0:4.14.192-147.314.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52698

<0:4.14.343-259.562.amzn2
  • M
Buffer Access with Incorrect Length Value

<0:4.14.343-259.562.amzn2
  • H
CVE-2023-52881

<0:4.14.334-252.552.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.328-248.540.amzn2
  • H
Out-of-bounds Read

<0:4.14.301-224.520.amzn2
  • H
Out-of-Bounds

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incorrect Check of Function Return Value

<0:4.14.238-182.421.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.158-129.185.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Out-of-bounds Read

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • H
Return of Wrong Status Code

<0:4.14.238-182.421.amzn2
  • M
Improper Input Validation

<0:4.14.232-176.381.amzn2
  • M
Unchecked Error Condition

<0:4.14.232-176.381.amzn2
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.14.219-161.340.amzn2
  • H
Out-of-bounds Write

<0:4.14.343-261.564.amzn2
  • H
Race Condition

<0:4.14.165-131.185.amzn2
  • M
CVE-2024-2193

<0:4.14.336-257.568.amzn2
  • M
CVE-2024-26602

<0:4.14.336-257.568.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Deadlock

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • M
Divide By Zero

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • H
Off-by-one Error

<0:4.14.336-257.562.amzn2
  • H
Improper Update of Reference Count

<0:4.14.336-257.562.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.336-257.562.amzn2
  • H
Use After Free

<0:4.14.336-256.559.amzn2
  • M
Out-of-bounds Write

<0:4.14.305-227.531.amzn2
  • H
Race Condition

<0:4.14.336-255.557.amzn2
  • H
Out-of-Bounds

<0:4.14.336-255.557.amzn2
  • H
Out-of-bounds Write

<0:4.14.336-255.557.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Deadlock

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Race Condition

<0:4.14.299-223.520.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Resource Exhaustion

<0:4.14.281-212.502.amzn2
  • H
Out-of-bounds Read

<0:4.14.336-253.554.amzn2
  • H
Resource Exhaustion

<0:4.14.334-252.552.amzn2
  • H
Memory Leak

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Race Condition

<0:4.14.334-252.552.amzn2
  • M
Use After Free

<0:4.14.330-250.540.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Integer Underflow

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Use After Free

<0:4.14.328-248.540.amzn2
  • H
Out-of-bounds Write

<0:4.14.328-248.540.amzn2
  • M
Resource Exhaustion

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Buffer Overflow

<0:4.14.326-245.539.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.309-231.529.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
NULL Pointer Dereference

<0:4.14.322-244.536.amzn2
  • H
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.326-245.539.amzn2
  • M
Divide By Zero

<0:4.14.322-244.539.amzn2
  • H
Information Exposure

<0:4.14.320-243.544.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • M
Use After Free

<0:4.14.322-244.536.amzn2
  • M
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • M
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.320-243.544.amzn2
  • H
Double Free

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.320-242.534.amzn2
  • H
Use After Free

<0:4.14.320-242.534.amzn2
  • H
Out-of-bounds Write

<0:4.14.318-240.529.amzn2
  • H
Race Condition

<0:4.14.313-235.533.amzn2
  • H
Incorrect Bitwise Shift of Integer

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Externally Controlled Reference to a Resource in Another Sphere

<0:4.14.304-226.531.amzn2
  • H
Out-of-Bounds

<0:4.14.241-184.433.amzn2
  • H
CVE-2022-20565

<0:4.14.198-152.320.amzn2
  • H
Resource Exhaustion

<0:4.14.318-241.531.amzn2
  • H
Out-of-bounds Read

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Improper Resource Locking

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Comparison Using Wrong Factors

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.313-235.533.amzn2
  • H
Use After Free

<0:4.14.314-238.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.314-237.533.amzn2
  • M
Use After Free

<0:4.14.314-237.533.amzn2
  • H
Execution with Unnecessary Privileges

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Out-of-Bounds

<0:4.14.309-231.529.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Resource Leak

<0:4.14.304-226.531.amzn2
  • H
Incorrect Conversion between Numeric Types

<0:4.14.281-212.502.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Double Free

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Incomplete Cleanup

<0:4.14.186-146.268.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.304-226.531.amzn2
  • H
Arbitrary Code Injection

<0:4.14.304-226.531.amzn2
  • M
Improper Locking

<0:4.14.248-189.473.amzn2
  • M
Missing Initialization of Resource

<0:4.14.248-189.473.amzn2
  • M
Use After Free

<0:4.14.248-189.473.amzn2
  • H
Access of Uninitialized Pointer

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Race Condition

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.301-224.520.amzn2
  • H
Memory Leak

<0:4.14.301-224.520.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Information Exposure

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.299-223.520.amzn2
  • H
Improper Initialization

<0:4.14.296-222.539.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.296-222.539.amzn2
  • H
Improper Update of Reference Count

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Logging of Excessive Data

<0:4.14.296-222.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Write

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Improper Update of Reference Count

<0:4.14.294-220.533.amzn2
  • H
Improper Locking

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Incomplete Cleanup

<0:4.14.294-220.533.amzn2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-36946

<0:4.14.294-220.533.amzn2
  • H
NULL Pointer Dereference

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.294-220.533.amzn2
  • H
Race Condition

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Privilege Dropping / Lowering Errors

<0:4.14.133-113.105.amzn2
  • H
CVE-2022-36946

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Integer Underflow

<0:4.14.291-218.527.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • M
Incomplete Cleanup

<0:4.14.290-217.505.amzn2
  • M
Out-of-bounds Write

<0:4.14.290-217.505.amzn2
  • M
Improper Update of Reference Count

<0:4.14.290-217.505.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.287-215.504.amzn2
  • H
CVE-2022-33744

<0:4.14.287-215.504.amzn2
  • H
Memory Leak

<0:4.14.287-215.504.amzn2
  • H
Use After Free

<0:4.14.287-215.504.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.285-215.501.amzn2
  • H
Buffer Overflow

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.285-215.501.amzn2
  • H
Information Exposure

<0:4.14.285-215.501.amzn2
  • H
Memory Leak

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Incorrect Default Permissions

<0:4.14.281-212.502.amzn2
  • H
Race Condition

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.276-211.499.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
CVE-2022-28356

<0:4.14.275-207.503.amzn2
  • H
Heap-based Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Missing Initialization of Resource

<0:4.14.273-207.502.amzn2
  • H
CVE-2022-23960

<0:4.14.268-205.500.amzn2
  • H
CVE-2021-26401

<0:4.14.268-205.500.amzn2
  • H
Exposure of Resource to Wrong Sphere

<0:4.14.268-205.500.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
NULL Pointer Dereference

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0002

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Write

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0001

<0:4.14.268-205.500.amzn2
  • H
Improper Authentication

<0:4.14.268-205.500.amzn2
  • H
Improper Initialization

<0:4.14.268-205.500.amzn2
  • H
Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Incomplete Cleanup

<0:4.14.268-205.500.amzn2
  • H
Missing Authorization

<0:4.14.262-200.489.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.262-200.489.amzn2
  • H
Incorrect Calculation of Buffer Size

<0:4.14.262-200.489.amzn2
  • H
Race Condition

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • M
Incomplete Cleanup

<0:4.14.256-197.484.amzn2
  • M
Improper Validation of Integrity Check Value

<0:4.14.256-197.484.amzn2
  • M
Race Condition

<0:4.14.256-197.484.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.252-195.481.amzn2
  • H
CVE-2021-38300

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Double Free

<0:4.14.252-195.481.amzn2
  • H
Race Condition

<0:4.14.252-195.481.amzn2
  • H
Improper Initialization

<0:4.14.252-195.481.amzn2
  • M
Race Condition

<0:4.14.248-189.473.amzn2
  • M
Race Condition

<0:4.14.246-187.474.amzn2
  • M
Out-of-bounds Read

<0:4.14.246-187.474.amzn2
  • M
CVE-2021-38198

<0:4.14.246-187.474.amzn2
  • M
Information Exposure

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • H
Out-of-Bounds

<0:4.14.243-185.433.amzn2
  • H
Missing Initialization of Resource

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Buffer Overflow

<0:4.14.238-182.422.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • H
Information Exposure

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Locking

<0:4.14.238-182.421.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-177.418.amzn2
  • M
Incorrect Authorization

<0:4.14.232-176.381.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • L
ALAS2-2021-1634

<0:4.14.231-173.361.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
CVE-2021-29647

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Arbitrary Command Injection

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Improper Initialization

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Buffer Overflow

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Off-by-one Error

<0:4.14.231-173.360.amzn2
  • H
Numeric Errors

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-27363

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
Out-of-bounds Read

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26932

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26930

<0:4.14.225-168.357.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.214-160.339.amzn2
  • H
Out-of-bounds Write

<0:4.14.214-160.339.amzn2
  • H
Out-of-Bounds

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
CVE-2020-8694

<0:4.14.209-160.335.amzn2
  • H
Out-of-bounds Read

<0:4.14.209-160.335.amzn2
  • H
Release of Invalid Pointer or Reference

<0:4.14.209-160.335.amzn2
  • H
Missing Authorization

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-27673

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
Resource Exhaustion

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-24490

<0:4.14.203-156.332.amzn2
  • H
Improper Input Validation

<0:4.14.203-156.332.amzn2
  • H
Missing Initialization of Resource

<0:4.14.203-156.332.amzn2
  • H
Use After Free

<0:4.14.203-156.332.amzn2
  • H
Buffer Overflow

<0:4.14.203-156.332.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.200-155.322.amzn2
  • H
Incorrect Authorization

<0:4.14.200-155.322.amzn2
  • H
Improper Input Validation

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Buffer Overflow

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Race Condition

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Read

<0:4.14.198-152.320.amzn2
  • H
Use After Free

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.193-149.317.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Race Condition

<0:4.14.192-147.314.amzn2
  • H
Out-of-bounds Read

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
CVE-2017-18232

<0:4.14.192-147.314.amzn2
  • H
Improper Locking

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10768

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10766

<0:4.14.186-146.268.amzn2
  • H
Out-of-Bounds

<0:4.14.186-146.268.amzn2
  • H
NULL Pointer Dereference

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10767

<0:4.14.186-146.268.amzn2
  • H
Information Exposure

<0:4.14.186-146.268.amzn2
  • H
Improper Input Validation

<0:4.14.186-146.268.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.177-139.253.amzn2
  • H
Use After Free

<0:4.14.177-139.253.amzn2
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.14.181-140.257.amzn2
  • H
CVE-2020-12770

<0:4.14.181-140.257.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.181-140.257.amzn2
  • H
Use After Free

<0:4.14.181-140.257.amzn2
  • H
Out-of-bounds Write

<0:4.14.181-140.257.amzn2
  • H
NULL Pointer Dereference

<0:4.14.177-139.254.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Information Exposure

<0:4.14.173-137.228.amzn2
  • H
Out-of-bounds Write

<0:4.14.173-137.228.amzn2
  • H
Memory Leak

<0:4.14.171-136.231.amzn2
  • H
Out-of-bounds Read

<0:4.14.171-136.231.amzn2
  • H
Memory Leak

<0:4.14.165-131.185.amzn2
  • H
Out-of-bounds Write

<0:4.14.165-131.185.amzn2
  • H
Improper Input Validation

<0:4.14.154-128.181.amzn2
  • M
CVE-2019-11135

<0:4.14.152-127.182.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.152-127.182.amzn2
  • H
Buffer Overflow

<0:4.14.146-119.123.amzn2
  • H
Out-of-bounds Write

<0:4.14.146-119.123.amzn2
  • M
Out-of-bounds Write

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.67-71.56.amzn2
  • M
Out-of-bounds Write

<0:4.14.67-71.56.amzn2
  • L
Information Exposure

<0:4.14.77-80.57.amzn2
  • L
Out-of-bounds Write

<0:4.14.55-68.37.amzn2
  • M
CVE-2019-1125

<0:4.14.133-113.112.amzn2
  • H
Improper Locking

<0:4.14.133-113.105.amzn2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.14.133-113.105.amzn2
  • C
Allocation of Resources Without Limits or Throttling

<0:4.14.123-111.109.amzn2
  • C
Integer Overflow or Wraparound

<0:4.14.123-111.109.amzn2
  • C
Resource Exhaustion

<0:4.14.123-111.109.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.121-109.96.amzn2
  • H
Out-of-bounds Write

<0:4.14.121-109.96.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.121-109.96.amzn2
  • H
CVE-2019-11884

<0:4.14.121-109.96.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.121-109.96.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.121-109.96.amzn2
  • H
Race Condition

<0:4.14.114-105.126.amzn2
  • H
CVE-2019-11091

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Numeric Errors

<0:4.14.114-103.97.amzn2
  • H
Out-of-bounds Read

<0:4.14.114-103.97.amzn2
  • H
Improper Input Validation

<0:4.14.114-103.97.amzn2
  • H
NULL Pointer Dereference

<0:4.14.106-97.85.amzn2
  • H
Memory Leak

<0:4.14.106-97.85.amzn2
  • H
CVE-2019-7222

<0:4.14.101-91.76.amzn2
  • H
Use After Free

<0:4.14.104-95.84.amzn2
  • H
Use After Free

<0:4.14.101-91.76.amzn2
  • H
Race Condition

<0:4.14.101-91.76.amzn2
  • M
Resource Exhaustion

<0:4.14.88-88.76.amzn2
  • H
Use After Free

<0:4.14.94-89.73.amzn2
  • M
Race Condition

<0:4.14.88-88.76.amzn2
  • M
NULL Pointer Dereference

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Improper Input Validation

<0:4.14.77-80.57.amzn2
  • M
Race Condition

<0:4.14.77-80.57.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.15-46.13.amzn2
  • H
Information Exposure

<0:4.14.72-73.55.amzn2
  • H
Use After Free

<0:4.14.72-73.55.amzn2
  • H
Out-of-bounds Write

<0:4.14.72-73.55.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Improper Input Validation

<0:4.14.62-70.117.amzn2
  • C
CVE-2018-3646

<0:4.14.62-70.117.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Resource Exhaustion

<0:4.14.59-68.43.amzn2
  • M
Use After Free

<0:4.14.55-68.37.amzn2
  • M
Race Condition

<0:4.14.51-66.38.amzn2
  • H
CVE-2018-3693

<0:4.14.47-63.37.amzn2
  • H
Information Exposure

<0:4.14.47-63.37.amzn2
  • H
Out-of-Bounds

<0:4.14.47-63.37.amzn2
  • H
Race Condition

<0:4.14.42-61.37.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.42-61.37.amzn2
  • H
CVE-2018-1087

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Use After Free

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.33-59.34.amzn2
  • H
Race Condition

<0:4.14.33-59.34.amzn2
  • H
CVE-2018-10901

<0:4.14.33-59.34.amzn2
  • H
CVE-2017-13215

<0:4.14.33-59.34.amzn2
  • H
Use After Free

<0:4.14.33-59.34.amzn2
  • H
Out-of-bounds Write

<0:4.9.85-47.59.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.9.81-44.57.amzn2
  • H
Use After Free

<0:4.9.81-44.57.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Out-of-bounds Read

<0:4.9.81-44.57.amzn2
  • H
Race Condition

<0:4.9.81-44.57.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2