kernel6.18-debuginfo-common-aarch64

Direct Vulnerabilities

Known vulnerabilities in the kernel6.18-debuginfo-common-aarch64 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Handling of Missing Special Element

<1:6.18.16-18.222.amzn2023
  • H
Improper Resource Locking

<1:6.18.16-18.222.amzn2023
  • H
Deadlock

<1:6.18.16-18.222.amzn2023
  • H
Incorrect Synchronization

<1:6.18.16-18.222.amzn2023
  • H
Buffer Access with Incorrect Length Value

<1:6.18.16-18.222.amzn2023
  • H
Buffer Access with Incorrect Length Value

<1:6.18.16-18.222.amzn2023
  • H
Release of Invalid Pointer or Reference

<1:6.18.16-18.222.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.16-18.222.amzn2023
  • H
Incorrect Calculation of Buffer Size

<1:6.18.16-18.222.amzn2023
  • H
Integer Overflow or Wraparound

<1:6.18.16-18.222.amzn2023
  • M
NULL Pointer Dereference

<1:6.18.16-18.222.amzn2023
  • H
Reachable Assertion

<1:6.18.16-18.222.amzn2023
  • M
CVE-2025-71266

<1:6.18.16-18.222.amzn2023
  • M
Protection Mechanism Failure

<1:6.18.16-18.222.amzn2023
  • H
Buffer Access with Incorrect Length Value

<1:6.18.16-18.222.amzn2023
  • H
Missing Synchronization

<1:6.18.16-18.222.amzn2023
  • H
Integer Overflow or Wraparound

<1:6.18.16-18.222.amzn2023
  • H
Improper Resource Locking

<1:6.18.16-18.222.amzn2023
  • H
Improper Validation of Specified Quantity in Input

<1:6.18.16-18.222.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.16-18.222.amzn2023
  • H
Incomplete Internal State Distinction

<1:6.18.16-18.222.amzn2023
  • H
Incorrect Check of Function Return Value

<1:6.18.16-18.222.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.16-18.222.amzn2023
  • M
Protection Mechanism Failure

<1:6.18.16-18.222.amzn2023
  • H
Incomplete Model of Endpoint Features

<1:6.18.16-18.222.amzn2023
  • H
Incorrect Synchronization

<1:6.18.16-18.222.amzn2023
  • M
Race Condition

<1:6.18.16-18.222.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.16-18.222.amzn2023
  • H
Unlock of a Resource that is not Locked

<1:6.18.16-18.222.amzn2023
  • H
Missing Synchronization

<1:6.18.16-18.222.amzn2023
  • H
Incorrect Synchronization

<1:6.18.16-18.222.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.16-18.222.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.16-18.222.amzn2023
  • M
Race Condition

<1:6.18.16-18.222.amzn2023
  • M
CVE-2025-71265

<1:6.18.16-18.222.amzn2023
  • M
Missing Initialization of Resource

<1:6.18.16-18.222.amzn2023
  • M
CVE-2025-71267

<1:6.18.16-18.222.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<1:6.18.20-41.237.amzn2023
  • H
Improper Handling of Structural Elements

<1:6.18.20-41.237.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-41.237.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Information Exposure

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.20-20.229.amzn2023
  • H
Improper Resource Locking

<1:6.18.20-20.229.amzn2023
  • H
Improper Resource Locking

<1:6.18.15-14.217.amzn2023
  • H
Incorrect Synchronization

<1:6.18.15-14.217.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.15-14.217.amzn2023
  • H
Write-what-where Condition

<1:6.18.25-55.108.amzn2023
  • H
Improper Validation of Consistency within Input

<1:6.18.20-41.237.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.20-20.229.amzn2023
  • H
Use of Function with Inconsistent Implementations

<1:6.18.20-20.229.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.20-20.229.amzn2023
  • H
Deadlock

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Out-of-bounds Write

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Symbolic Name not Mapping to Correct Object

<1:6.18.20-20.229.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Incorrect Privilege Assignment

<1:6.18.20-20.229.amzn2023
  • H
Exposure of Data Element to Wrong Session

<1:6.18.20-20.229.amzn2023
  • H
Missing Initialization of Resource

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Incorrect Pointer Scaling

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Out-of-bounds Read

<1:6.18.20-20.229.amzn2023
  • H
Out-of-bounds Read

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Missing Initialization of Resource

<1:6.18.20-20.229.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.20-20.229.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Incomplete Cleanup

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.20-20.229.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.20-20.229.amzn2023
  • H
Missing Initialization of Resource

<1:6.18.20-20.229.amzn2023
  • H
Use of Uninitialized Resource

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
CVE-2026-23244

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
Allocation of Resources Without Limits or Throttling

<1:6.18.20-20.229.amzn2023
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<1:6.18.20-20.229.amzn2023
  • H
Incorrect Pointer Scaling

<1:6.18.20-20.229.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:6.18.20-20.229.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:6.18.20-20.229.amzn2023
  • H
Improper Validation of Specified Index, Position, or Offset in Input

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Incomplete Cleanup

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Deadlock

<1:6.18.20-20.229.amzn2023
  • H
Missing Initialization of Resource

<1:6.18.20-20.229.amzn2023
  • H
Integer Overflow or Wraparound

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Out-of-bounds Write

<1:6.18.20-20.229.amzn2023
  • H
Improper Resource Locking

<1:6.18.20-20.229.amzn2023
  • H
Incorrect Conversion between Numeric Types

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
Improper Preservation of Permissions

<1:6.18.20-20.229.amzn2023
  • H
Release of Invalid Pointer or Reference

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Use After Free

<1:6.18.20-20.229.amzn2023
  • H
Incorrect Synchronization

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
Improper Handling of Length Parameter Inconsistency

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Incorrect Synchronization

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
Multiple Locks of a Critical Resource

<1:6.18.20-20.229.amzn2023
  • H
Processor Optimization Removal or Modification of Security-critical Code

<1:6.18.20-20.229.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.20-20.229.amzn2023
  • H
Use After Free

<1:6.18.20-20.229.amzn2023
  • H
CVE-2026-23245

<1:6.18.20-20.229.amzn2023
  • H
NULL Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Detection of Error Condition Without Action

<1:6.18.20-20.229.amzn2023
  • H
Expired Pointer Dereference

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Improper Resource Locking

<1:6.18.20-20.229.amzn2023
  • H
Improper Validation of Consistency within Input

<1:6.18.20-20.229.amzn2023
  • H
Plaintext Storage of a Password

<1:6.18.20-20.229.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:6.18.20-20.229.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.20-20.229.amzn2023
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:6.18.20-20.229.amzn2023
  • H
Operation on a Resource after Expiration or Release

<1:6.18.20-20.229.amzn2023
  • H
Access of Uninitialized Pointer

<1:6.18.20-20.229.amzn2023
  • H
Improper Update of Reference Count

<1:6.18.20-20.229.amzn2023
  • H
Incomplete Cleanup

<1:6.18.20-20.229.amzn2023
  • H
Time-of-check Time-of-use (TOCTOU)

<1:6.18.20-20.229.amzn2023
  • H
Race Condition

<1:6.18.20-20.229.amzn2023
  • H
CVE-2026-23247

<1:6.18.20-20.229.amzn2023
  • M
CVE-2025-71267

<1:6.18.16-18.222.amzn2023
  • M
Race Condition

<1:6.18.16-18.222.amzn2023
  • H
Unlock of a Resource that is not Locked

<1:6.18.15-14.217.amzn2023
  • H
Incorrect Calculation of Buffer Size

<1:6.18.15-14.217.amzn2023
  • H
CVE-2026-23263

<1:6.18.15-14.217.amzn2023
  • H
Improper Validation of Consistency within Input

<1:6.18.15-14.217.amzn2023
  • M
Protection Mechanism Failure

<1:6.18.16-18.222.amzn2023
  • M
Protection Mechanism Failure

<1:6.18.16-18.222.amzn2023
  • M
Race Condition

<1:6.18.16-18.222.amzn2023
  • M
CVE-2025-71266

<1:6.18.16-18.222.amzn2023
  • M
CVE-2025-71265

<1:6.18.16-18.222.amzn2023
  • M
NULL Pointer Dereference

<1:6.18.16-18.222.amzn2023
  • H
Missing Release of Resource after Effective Lifetime

<1:6.18.15-14.217.amzn2023
  • H
Race Condition

<1:6.18.15-14.217.amzn2023
  • H
CVE-2026-23254

<1:6.18.15-14.217.amzn2023
  • H
CVE-2026-23260

<1:6.18.15-14.217.amzn2023
  • H
Incorrect Calculation of Buffer Size

<1:6.18.15-14.217.amzn2023
  • H
CVE-2026-23259

<1:6.18.15-14.217.amzn2023