python-perf-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-perf-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46745

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46840

<0:4.14.355-271.569.amzn2
  • M
Race Condition

<0:4.14.352-267.564.amzn2
  • M
Improper Input Validation

<0:4.14.352-267.564.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Out-of-bounds Read

<0:4.14.355-271.569.amzn2
  • M
NULL Pointer Dereference

<0:4.14.352-268.569.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46780

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Link Following

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • H
Incomplete Cleanup

<0:4.14.349-266.564.amzn2
  • M
Race Condition

<0:4.14.350-266.564.amzn2
  • M
Race Condition During Access to Alternate Channel

<0:4.14.350-266.564.amzn2
  • H
CVE-2024-35849

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35960

<0:4.14.348-265.562.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.238-182.421.amzn2
  • M
Resource Leak

<0:4.14.353-270.569.amzn2
  • M
Memory Leak

<0:4.14.353-270.569.amzn2
  • H
Use After Free

<0:4.14.352-268.568.amzn2
  • M
CVE-2024-35807

<0:4.14.336-257.566.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-35815

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35925

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35847

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-27413

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52691

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52675

<0:4.14.343-259.562.amzn2
  • H
Double Free

<0:4.14.273-207.502.amzn2
  • H
Use After Free

<0:4.14.273-207.502.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • M
Information Exposure

<0:4.14.350-266.564.amzn2
  • M
Use of Uninitialized Variable

<0:4.14.350-266.564.amzn2
  • M
Use After Free

<0:4.14.350-266.564.amzn2
  • M
Deadlock

<0:4.14.350-266.564.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • H
Improper Input Validation

<0:4.14.348-265.562.amzn2
  • M
Memory Leak

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26920

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26805

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Double Free

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Length Parameter Inconsistency

<0:4.14.343-259.562.amzn2
  • M
Divide By Zero

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26764

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • H
Off-by-one Error

<0:4.14.296-222.539.amzn2
  • H
CVE-2022-48704

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-48695

<0:4.14.294-220.533.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.273-207.502.amzn2
  • H
Integer Underflow

<0:4.14.268-205.500.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • M
Improper Input Validation

<0:4.14.256-197.484.amzn2
  • M
Incorrect Synchronization

<0:4.14.256-197.484.amzn2
  • M
Excessive Platform Resource Consumption within a Loop

<0:4.14.256-197.484.amzn2
  • M
NULL Pointer Dereference

<0:4.14.256-197.484.amzn2
  • H
Double Free

<0:4.14.349-266.564.amzn2
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.14.345-262.561.amzn2
  • H
Improper Input Validation

<0:4.14.349-266.564.amzn2
  • H
Use After Free

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-26956

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-27059

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26976

<0:4.14.345-262.561.amzn2
  • H
Return of Wrong Status Code

<0:4.14.345-262.561.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
NULL Pointer Dereference

<0:4.14.345-262.561.amzn2
  • H
Improper Locking

<0:4.14.349-266.564.amzn2
  • H
Out-of-bounds Read

<0:4.14.349-266.564.amzn2
  • H
Incomplete Cleanup

<0:4.14.348-265.565.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-26981

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • M
Out-of-bounds Write

<0:4.14.327-246.539.amzn2
  • H
Race Condition

<0:4.14.328-248.540.amzn2
  • M
Unchecked Return Value

<0:4.14.327-246.539.amzn2
  • M
Improper Input Validation

<0:4.14.327-246.539.amzn2
  • M
Use After Free

<0:4.14.327-246.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Reachable Assertion

<0:4.14.296-222.539.amzn2
  • H
Resource Exhaustion

<0:4.14.296-222.539.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Missing Synchronization

<0:4.14.268-205.500.amzn2
  • H
Buffer Underflow

<0:4.14.268-205.500.amzn2
  • H
Use After Free

<0:4.14.268-205.500.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.262-200.489.amzn2
  • H
Divide By Zero

<0:4.14.262-200.489.amzn2
  • H
Deadlock

<0:4.14.262-200.489.amzn2
  • H
Double Free

<0:4.14.262-200.489.amzn2
  • H
Improper Update of Reference Count

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
CVE-2021-47055

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • C
Improper Access Control

<0:4.14.59-68.43.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.344-262.563.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35947

<0:4.14.348-265.562.amzn2
  • H
Double Free

<0:4.14.348-265.562.amzn2
  • H
Use After Free

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.348-265.565.amzn2
  • H
Out-of-bounds Write

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
NULL Pointer Dereference

<0:4.14.348-265.562.amzn2
  • H
Divide By Zero

<0:4.14.348-265.562.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Read

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • M
Resource Exhaustion

<0:4.14.343-259.562.amzn2
  • M
Information Exposure

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Missing Initialization of a Variable

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Stack-based Buffer Overflow

<0:4.14.343-259.562.amzn2
  • H
CVE-2024-23851

<0:4.14.336-257.562.amzn2
  • H
Deadlock

<0:4.14.334-252.552.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Resource Injection

<0:4.14.348-265.562.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Improperly Implemented Security Check for Standard

<0:4.14.348-265.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.330-250.540.amzn2
  • H
Use After Free

<0:4.14.192-147.314.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52698

<0:4.14.343-259.562.amzn2
  • M
Buffer Access with Incorrect Length Value

<0:4.14.343-259.562.amzn2
  • H
CVE-2023-52881

<0:4.14.334-252.552.amzn2
  • H
NULL Pointer Dereference

<0:4.14.328-248.540.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.301-224.520.amzn2
  • H
Out-of-Bounds

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incorrect Check of Function Return Value

<0:4.14.238-182.421.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.158-129.185.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Out-of-bounds Read

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Return of Wrong Status Code

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • M
Unchecked Error Condition

<0:4.14.232-176.381.amzn2
  • M
Improper Input Validation

<0:4.14.232-176.381.amzn2
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.14.219-161.340.amzn2
  • H
Out-of-bounds Write

<0:4.14.343-261.564.amzn2
  • H
Race Condition

<0:4.14.165-131.185.amzn2
  • M
CVE-2024-26602

<0:4.14.336-257.568.amzn2
  • M
CVE-2024-2193

<0:4.14.336-257.568.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Deadlock

<0:4.14.238-182.421.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • M
Divide By Zero

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • H
Improper Update of Reference Count

<0:4.14.336-257.562.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.336-257.562.amzn2
  • H
Off-by-one Error

<0:4.14.336-257.562.amzn2
  • H
Use After Free

<0:4.14.336-256.559.amzn2
  • M
Out-of-bounds Write

<0:4.14.305-227.531.amzn2
  • H
Out-of-bounds Write

<0:4.14.336-255.557.amzn2
  • H
Race Condition

<0:4.14.336-255.557.amzn2
  • H
Out-of-Bounds

<0:4.14.336-255.557.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Deadlock

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Race Condition

<0:4.14.299-223.520.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Resource Exhaustion

<0:4.14.281-212.502.amzn2
  • H
Out-of-bounds Read

<0:4.14.336-253.554.amzn2
  • H
Resource Exhaustion

<0:4.14.334-252.552.amzn2
  • H
Memory Leak

<0:4.14.309-231.529.amzn2
  • H
Race Condition

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • M
Use After Free

<0:4.14.330-250.540.amzn2
  • H
Integer Underflow

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Out-of-bounds Write

<0:4.14.328-248.540.amzn2
  • H
Use After Free

<0:4.14.328-248.540.amzn2
  • M
Resource Exhaustion

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Buffer Overflow

<0:4.14.326-245.539.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.309-231.529.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
NULL Pointer Dereference

<0:4.14.322-244.536.amzn2
  • H
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.326-245.539.amzn2
  • M
Divide By Zero

<0:4.14.322-244.539.amzn2
  • H
Information Exposure

<0:4.14.320-243.544.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • M
Use After Free

<0:4.14.322-244.536.amzn2
  • M
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • M
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.320-243.544.amzn2
  • H
Double Free

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.320-242.534.amzn2
  • H
Use After Free

<0:4.14.320-242.534.amzn2
  • H
Out-of-bounds Write

<0:4.14.318-240.529.amzn2
  • H
Race Condition

<0:4.14.313-235.533.amzn2
  • H
Incorrect Bitwise Shift of Integer

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Externally Controlled Reference to a Resource in Another Sphere

<0:4.14.304-226.531.amzn2
  • H
Out-of-Bounds

<0:4.14.241-184.433.amzn2
  • H
CVE-2022-20565

<0:4.14.198-152.320.amzn2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.14.318-241.531.amzn2
  • H
Out-of-bounds Read

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Improper Resource Locking

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Comparison Using Wrong Factors

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.313-235.533.amzn2
  • H
Use After Free

<0:4.14.314-238.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.314-237.533.amzn2
  • M
Use After Free

<0:4.14.314-237.533.amzn2
  • H
Execution with Unnecessary Privileges

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Out-of-Bounds

<0:4.14.309-231.529.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Resource Leak

<0:4.14.304-226.531.amzn2
  • H
Incorrect Conversion between Numeric Types

<0:4.14.281-212.502.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Double Free

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Incomplete Cleanup

<0:4.14.186-146.268.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.304-226.531.amzn2
  • H
Arbitrary Code Injection

<0:4.14.304-226.531.amzn2
  • M
Improper Locking

<0:4.14.248-189.473.amzn2
  • M
Missing Initialization of Resource

<0:4.14.248-189.473.amzn2
  • M
Use After Free

<0:4.14.248-189.473.amzn2
  • H
Access of Uninitialized Pointer

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Race Condition

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.301-224.520.amzn2
  • H
Memory Leak

<0:4.14.301-224.520.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Information Exposure

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.299-223.520.amzn2
  • H
Improper Initialization

<0:4.14.296-222.539.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.296-222.539.amzn2
  • H
Improper Update of Reference Count

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Logging of Excessive Data

<0:4.14.296-222.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Write

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Improper Update of Reference Count

<0:4.14.294-220.533.amzn2
  • H
Improper Locking

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Incomplete Cleanup

<0:4.14.294-220.533.amzn2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-36946

<0:4.14.294-220.533.amzn2
  • H
NULL Pointer Dereference

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.294-220.533.amzn2
  • H
Race Condition

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Privilege Dropping / Lowering Errors

<0:4.14.133-113.105.amzn2
  • H
CVE-2022-36946

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Integer Underflow

<0:4.14.291-218.527.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • M
Incomplete Cleanup

<0:4.14.290-217.505.amzn2
  • M
Out-of-bounds Write

<0:4.14.290-217.505.amzn2
  • M
Improper Update of Reference Count

<0:4.14.290-217.505.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.287-215.504.amzn2
  • H
CVE-2022-33744

<0:4.14.287-215.504.amzn2
  • H
Memory Leak

<0:4.14.287-215.504.amzn2
  • H
Use After Free

<0:4.14.287-215.504.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.285-215.501.amzn2
  • H
Buffer Overflow

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.285-215.501.amzn2
  • H
Information Exposure

<0:4.14.285-215.501.amzn2
  • H
Memory Leak

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Incorrect Default Permissions

<0:4.14.281-212.502.amzn2
  • H
Race Condition

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.276-211.499.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
CVE-2022-28356

<0:4.14.275-207.503.amzn2
  • H
Heap-based Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Missing Initialization of Resource

<0:4.14.273-207.502.amzn2
  • H
CVE-2022-23960

<0:4.14.268-205.500.amzn2
  • H
CVE-2021-26401

<0:4.14.268-205.500.amzn2
  • H
Exposure of Resource to Wrong Sphere

<0:4.14.268-205.500.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
NULL Pointer Dereference

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0002

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Write

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0001

<0:4.14.268-205.500.amzn2
  • H
Improper Authentication

<0:4.14.268-205.500.amzn2
  • H
Improper Initialization

<0:4.14.268-205.500.amzn2
  • H
Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Incomplete Cleanup

<0:4.14.268-205.500.amzn2
  • H
Missing Authorization

<0:4.14.262-200.489.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.262-200.489.amzn2
  • H
Incorrect Calculation of Buffer Size

<0:4.14.262-200.489.amzn2
  • H
Race Condition

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • M
Incomplete Cleanup

<0:4.14.256-197.484.amzn2
  • M
Improper Validation of Integrity Check Value

<0:4.14.256-197.484.amzn2
  • M
Race Condition

<0:4.14.256-197.484.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.252-195.481.amzn2
  • H
CVE-2021-38300

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Double Free

<0:4.14.252-195.481.amzn2
  • H
Race Condition

<0:4.14.252-195.481.amzn2
  • H
Improper Initialization

<0:4.14.252-195.481.amzn2
  • M
Race Condition

<0:4.14.248-189.473.amzn2
  • M
Race Condition

<0:4.14.246-187.474.amzn2
  • M
Out-of-bounds Read

<0:4.14.246-187.474.amzn2
  • M
CVE-2021-38198

<0:4.14.246-187.474.amzn2
  • M
Information Exposure

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • H
Out-of-Bounds

<0:4.14.243-185.433.amzn2
  • H
Missing Initialization of Resource

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Buffer Overflow

<0:4.14.238-182.422.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • H
Information Exposure

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Locking

<0:4.14.238-182.421.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-177.418.amzn2
  • M
Incorrect Authorization

<0:4.14.232-176.381.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • L
ALAS2-2021-1634

<0:4.14.231-173.361.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
CVE-2021-29647

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Arbitrary Command Injection

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Improper Initialization

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Buffer Overflow

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Off-by-one Error

<0:4.14.231-173.360.amzn2
  • H
Numeric Errors

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-27363

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
Out-of-bounds Read

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26932

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26930

<0:4.14.225-168.357.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.214-160.339.amzn2
  • H
Out-of-bounds Write

<0:4.14.214-160.339.amzn2
  • H
Out-of-Bounds

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
CVE-2020-8694

<0:4.14.209-160.335.amzn2
  • H
Out-of-bounds Read

<0:4.14.209-160.335.amzn2
  • H
Release of Invalid Pointer or Reference

<0:4.14.209-160.335.amzn2
  • H
Missing Authorization

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-27673

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
Resource Exhaustion

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-24490

<0:4.14.203-156.332.amzn2
  • H
Improper Input Validation

<0:4.14.203-156.332.amzn2
  • H
Missing Initialization of Resource

<0:4.14.203-156.332.amzn2
  • H
Use After Free

<0:4.14.203-156.332.amzn2
  • H
Buffer Overflow

<0:4.14.203-156.332.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.200-155.322.amzn2
  • H
Incorrect Authorization

<0:4.14.200-155.322.amzn2
  • H
Improper Input Validation

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Buffer Overflow

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Race Condition

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Read

<0:4.14.198-152.320.amzn2
  • H
Use After Free

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.193-149.317.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Race Condition

<0:4.14.192-147.314.amzn2
  • H
Out-of-bounds Read

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
CVE-2017-18232

<0:4.14.192-147.314.amzn2
  • H
Improper Locking

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10768

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10766

<0:4.14.186-146.268.amzn2
  • H
Out-of-Bounds

<0:4.14.186-146.268.amzn2
  • H
NULL Pointer Dereference

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10767

<0:4.14.186-146.268.amzn2
  • H
Information Exposure

<0:4.14.186-146.268.amzn2
  • H
Improper Input Validation

<0:4.14.186-146.268.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.177-139.253.amzn2
  • H
Use After Free

<0:4.14.177-139.253.amzn2
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.14.181-140.257.amzn2
  • H
CVE-2020-12770

<0:4.14.181-140.257.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.181-140.257.amzn2
  • H
Use After Free

<0:4.14.181-140.257.amzn2
  • H
Out-of-bounds Write

<0:4.14.181-140.257.amzn2
  • H
NULL Pointer Dereference

<0:4.14.177-139.254.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Information Exposure

<0:4.14.173-137.228.amzn2
  • H
Out-of-bounds Write

<0:4.14.173-137.228.amzn2
  • H
Memory Leak

<0:4.14.171-136.231.amzn2
  • H
Out-of-bounds Read

<0:4.14.171-136.231.amzn2
  • H
Memory Leak

<0:4.14.165-131.185.amzn2
  • H
Out-of-bounds Write

<0:4.14.165-131.185.amzn2
  • H
Improper Input Validation

<0:4.14.154-128.181.amzn2
  • M
CVE-2019-11135

<0:4.14.152-127.182.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.152-127.182.amzn2
  • H
Buffer Overflow

<0:4.14.146-119.123.amzn2
  • H
Out-of-bounds Write

<0:4.14.146-119.123.amzn2
  • M
Out-of-bounds Write

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.67-71.56.amzn2
  • M
Out-of-bounds Write

<0:4.14.67-71.56.amzn2
  • L
Information Exposure

<0:4.14.77-80.57.amzn2
  • L
Out-of-bounds Write

<0:4.14.55-68.37.amzn2
  • M
CVE-2019-1125

<0:4.14.133-113.112.amzn2
  • H
Improper Locking

<0:4.14.133-113.105.amzn2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.14.133-113.105.amzn2
  • C
Allocation of Resources Without Limits or Throttling

<0:4.14.123-111.109.amzn2
  • C
Integer Overflow or Wraparound

<0:4.14.123-111.109.amzn2
  • C
Resource Exhaustion

<0:4.14.123-111.109.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.121-109.96.amzn2
  • H
Out-of-bounds Write

<0:4.14.121-109.96.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.121-109.96.amzn2
  • H
CVE-2019-11884

<0:4.14.121-109.96.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.121-109.96.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.121-109.96.amzn2
  • H
Race Condition

<0:4.14.114-105.126.amzn2
  • H
CVE-2019-11091

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Numeric Errors

<0:4.14.114-103.97.amzn2
  • H
Out-of-bounds Read

<0:4.14.114-103.97.amzn2
  • H
Improper Input Validation

<0:4.14.114-103.97.amzn2
  • H
NULL Pointer Dereference

<0:4.14.106-97.85.amzn2
  • H
Memory Leak

<0:4.14.106-97.85.amzn2
  • H
CVE-2019-7222

<0:4.14.101-91.76.amzn2
  • H
Use After Free

<0:4.14.104-95.84.amzn2
  • H
Use After Free

<0:4.14.101-91.76.amzn2
  • H
Race Condition

<0:4.14.101-91.76.amzn2
  • M
Resource Exhaustion

<0:4.14.88-88.76.amzn2
  • H
Use After Free

<0:4.14.94-89.73.amzn2
  • M
Race Condition

<0:4.14.88-88.76.amzn2
  • M
NULL Pointer Dereference

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Improper Input Validation

<0:4.14.77-80.57.amzn2
  • M
Race Condition

<0:4.14.77-80.57.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.15-46.13.amzn2
  • H
Information Exposure

<0:4.14.72-73.55.amzn2
  • H
Use After Free

<0:4.14.72-73.55.amzn2
  • H
Out-of-bounds Write

<0:4.14.72-73.55.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Improper Input Validation

<0:4.14.62-70.117.amzn2
  • C
CVE-2018-3646

<0:4.14.62-70.117.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Resource Exhaustion

<0:4.14.59-68.43.amzn2
  • M
Use After Free

<0:4.14.55-68.37.amzn2
  • M
Race Condition

<0:4.14.51-66.38.amzn2
  • H
CVE-2018-3693

<0:4.14.47-63.37.amzn2
  • H
Information Exposure

<0:4.14.47-63.37.amzn2
  • H
Out-of-Bounds

<0:4.14.47-63.37.amzn2
  • H
Race Condition

<0:4.14.42-61.37.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.42-61.37.amzn2
  • H
CVE-2018-1087

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Use After Free

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.33-59.34.amzn2
  • H
Race Condition

<0:4.14.33-59.34.amzn2
  • H
CVE-2018-10901

<0:4.14.33-59.34.amzn2
  • H
CVE-2017-13215

<0:4.14.33-59.34.amzn2
  • H
Use After Free

<0:4.14.33-59.34.amzn2
  • H
Out-of-bounds Write

<0:4.9.85-47.59.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.9.81-44.57.amzn2
  • H
Use After Free

<0:4.9.81-44.57.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Out-of-bounds Read

<0:4.9.81-44.57.amzn2
  • H
Race Condition

<0:4.9.81-44.57.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2