kernel-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

<0:4.14.352-267.564.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Out-of-bounds Write

<0:4.14.352-267.564.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Race Condition

<0:4.14.336-257.566.amzn2
  • H
Improper Locking

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35944

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35930

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35910

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26973

<0:4.14.345-262.561.amzn2
  • H
Missing Synchronization

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-26993

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-35835

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Write Handling in Limited-write Non-Volatile Memories

<0:4.14.343-259.562.amzn2
  • M
Memory Leak

<0:4.14.343-259.562.amzn2
  • M
Double Free

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • H
Resource Injection

<0:4.14.334-252.552.amzn2
  • H
NULL Pointer Dereference

<0:4.14.334-252.552.amzn2
  • M
Buffer Overflow

<0:4.14.330-250.540.amzn2
  • M
Improper Input Validation

<0:4.14.330-250.540.amzn2
  • M
Out-of-Bounds

<0:4.14.330-250.540.amzn2
  • H
Buffer Underflow

<0:4.14.309-231.529.amzn2
  • H
External Control of System or Configuration Setting

<0:4.14.309-231.529.amzn2
  • H
Out-of-bounds Read

<0:4.14.273-207.502.amzn2
  • H
NULL Pointer Dereference

<0:4.14.273-207.502.amzn2
  • H
State Issues

<0:4.14.268-205.500.amzn2
  • H
Resource Injection

<0:4.14.268-205.500.amzn2
  • H
Incorrect Default Permissions

<0:4.14.268-205.500.amzn2
  • H
Trust Boundary Violation

<0:4.14.262-200.489.amzn2
  • H
Resource Leak

<0:4.14.252-195.481.amzn2
  • H
Out-of-bounds Write

<0:4.14.252-195.481.amzn2
  • H
CVE-2021-47387

<0:4.14.252-195.481.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Unsynchronized Access to Shared Data in a Multithreaded Context

<0:4.14.238-182.421.amzn2
  • H
Out-of-bounds Read

<0:4.14.238-182.421.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46780

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46840

<0:4.14.355-271.569.amzn2
  • M
Out-of-bounds Read

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Resource Injection

<0:4.14.352-267.564.amzn2
  • M
Improper Input Validation

<0:4.14.352-267.564.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
NULL Pointer Dereference

<0:4.14.352-268.569.amzn2
  • M
Link Following

<0:4.14.355-271.569.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Race Condition

<0:4.14.352-267.564.amzn2
  • M
Improper Locking

<0:4.14.355-271.569.amzn2
  • M
Use After Free

<0:4.14.355-271.569.amzn2
  • M
Integer Underflow

<0:4.14.355-271.569.amzn2
  • M
CVE-2024-46745

<0:4.14.355-271.569.amzn2
  • M
Race Condition

<0:4.14.350-266.564.amzn2
  • H
Incomplete Cleanup

<0:4.14.349-266.564.amzn2
  • M
Race Condition During Access to Alternate Channel

<0:4.14.350-266.564.amzn2
  • H
CVE-2024-35849

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35960

<0:4.14.348-265.562.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.334-252.552.amzn2
  • H
Improper Validation of Array Index

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.238-182.421.amzn2
  • M
Memory Leak

<0:4.14.353-270.569.amzn2
  • M
Resource Leak

<0:4.14.353-270.569.amzn2
  • H
Use After Free

<0:4.14.352-268.568.amzn2
  • M
CVE-2024-35807

<0:4.14.336-257.566.amzn2
  • H
CVE-2024-35925

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-35815

<0:4.14.345-262.561.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-35847

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-27413

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52691

<0:4.14.343-259.562.amzn2
  • M
CVE-2023-52675

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.273-207.502.amzn2
  • H
Double Free

<0:4.14.273-207.502.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • M
Deadlock

<0:4.14.350-266.564.amzn2
  • M
Use of Uninitialized Variable

<0:4.14.350-266.564.amzn2
  • M
Information Exposure

<0:4.14.350-266.564.amzn2
  • M
Use After Free

<0:4.14.350-266.564.amzn2
  • H
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • M
Memory Leak

<0:4.14.343-259.562.amzn2
  • H
Improper Input Validation

<0:4.14.348-265.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Double Free

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Length Parameter Inconsistency

<0:4.14.343-259.562.amzn2
  • M
Divide By Zero

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26920

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26805

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Resource Leak

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
CVE-2024-26764

<0:4.14.343-259.562.amzn2
  • M
Race Condition

<0:4.14.343-259.562.amzn2
  • H
Off-by-one Error

<0:4.14.296-222.539.amzn2
  • H
CVE-2022-48704

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-48695

<0:4.14.294-220.533.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.273-207.502.amzn2
  • H
Integer Underflow

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • M
Excessive Platform Resource Consumption within a Loop

<0:4.14.256-197.484.amzn2
  • M
Improper Input Validation

<0:4.14.256-197.484.amzn2
  • M
Incorrect Synchronization

<0:4.14.256-197.484.amzn2
  • M
NULL Pointer Dereference

<0:4.14.256-197.484.amzn2
  • H
NULL Pointer Dereference

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-26956

<0:4.14.345-262.561.amzn2
  • H
Out-of-bounds Read

<0:4.14.349-266.564.amzn2
  • H
Double Free

<0:4.14.349-266.564.amzn2
  • H
CVE-2024-26976

<0:4.14.345-262.561.amzn2
  • H
Improper Handling of Overlap Between Protected Memory Ranges

<0:4.14.345-262.561.amzn2
  • H
CVE-2024-27059

<0:4.14.345-262.561.amzn2
  • H
Return of Wrong Status Code

<0:4.14.345-262.561.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.349-266.564.amzn2
  • H
Improper Locking

<0:4.14.349-266.564.amzn2
  • H
Use After Free

<0:4.14.349-266.564.amzn2
  • H
Improper Input Validation

<0:4.14.349-266.564.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Incomplete Cleanup

<0:4.14.348-265.565.amzn2
  • H
CVE-2024-26981

<0:4.14.348-265.562.amzn2
  • M
Improper Resource Locking

<0:4.14.343-259.562.amzn2
  • H
Race Condition

<0:4.14.328-248.540.amzn2
  • M
Use After Free

<0:4.14.327-246.539.amzn2
  • M
Unchecked Return Value

<0:4.14.327-246.539.amzn2
  • M
Improper Input Validation

<0:4.14.327-246.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.327-246.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Resource Exhaustion

<0:4.14.296-222.539.amzn2
  • H
Reachable Assertion

<0:4.14.296-222.539.amzn2
  • H
Missing Synchronization

<0:4.14.268-205.500.amzn2
  • H
Buffer Underflow

<0:4.14.268-205.500.amzn2
  • H
Stack-based Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Use After Free

<0:4.14.268-205.500.amzn2
  • H
Resource Leak

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Read

<0:4.14.268-205.500.amzn2
  • H
Deadlock

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Out-of-bounds Write

<0:4.14.262-200.489.amzn2
  • H
Divide By Zero

<0:4.14.262-200.489.amzn2
  • H
Double Free

<0:4.14.262-200.489.amzn2
  • H
Improper Update of Reference Count

<0:4.14.262-200.489.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Improper Cleanup on Thrown Exception

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
CVE-2021-47055

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Improper Access Control

<0:4.14.59-68.43.amzn2
  • C
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • H
Resource Injection

<0:4.14.348-265.565.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.344-262.563.amzn2
  • H
Use After Free

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Read

<0:4.14.348-265.562.amzn2
  • M
CVE-2024-35809

<0:4.14.345-262.561.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.345-262.561.amzn2
  • H
Double Free

<0:4.14.348-265.562.amzn2
  • H
NULL Pointer Dereference

<0:4.14.348-265.562.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • M
Resource Injection

<0:4.14.345-262.561.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
CVE-2024-35947

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • H
Resource Leak

<0:4.14.348-265.562.amzn2
  • H
Divide By Zero

<0:4.14.348-265.562.amzn2
  • H
Out-of-bounds Write

<0:4.14.348-265.562.amzn2
  • H
Race Condition

<0:4.14.348-265.562.amzn2
  • M
Improper Input Validation

<0:4.14.343-259.562.amzn2
  • M
Missing Initialization of a Variable

<0:4.14.343-259.562.amzn2
  • M
Stack-based Buffer Overflow

<0:4.14.343-259.562.amzn2
  • M
Resource Exhaustion

<0:4.14.343-259.562.amzn2
  • M
Information Exposure

<0:4.14.343-259.562.amzn2
  • M
Resource Injection

<0:4.14.343-259.562.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • H
CVE-2024-23851

<0:4.14.336-257.562.amzn2
  • H
Deadlock

<0:4.14.334-252.552.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • M
NULL Pointer Dereference

<0:4.14.343-259.562.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • H
Resource Injection

<0:4.14.348-265.562.amzn2
  • H
Improperly Implemented Security Check for Standard

<0:4.14.348-265.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.330-250.540.amzn2
  • H
Use After Free

<0:4.14.192-147.314.amzn2
  • M
CVE-2023-52698

<0:4.14.343-259.562.amzn2
  • M
Deadlock

<0:4.14.343-259.562.amzn2
  • M
Improper Handling of Values

<0:4.14.343-259.562.amzn2
  • M
Buffer Access with Incorrect Length Value

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.276-211.499.amzn2
  • H
CVE-2023-52881

<0:4.14.334-252.552.amzn2
  • H
NULL Pointer Dereference

<0:4.14.328-248.540.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.301-224.520.amzn2
  • H
Out-of-Bounds

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incorrect Check of Function Return Value

<0:4.14.238-182.421.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • M
Use After Free

<0:4.14.158-129.185.amzn2
  • M
Use After Free

<0:4.14.343-259.562.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Resource Injection

<0:4.14.238-182.421.amzn2
  • H
Return of Wrong Status Code

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Memory Leak

<0:4.14.238-182.421.amzn2
  • H
Out-of-bounds Read

<0:4.14.238-182.421.amzn2
  • M
Unchecked Error Condition

<0:4.14.232-176.381.amzn2
  • M
Improper Input Validation

<0:4.14.232-176.381.amzn2
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.14.219-161.340.amzn2
  • H
Out-of-bounds Write

<0:4.14.343-261.564.amzn2
  • H
Race Condition

<0:4.14.165-131.185.amzn2
  • M
CVE-2024-2193

<0:4.14.336-257.568.amzn2
  • M
CVE-2024-26602

<0:4.14.336-257.568.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.262-200.489.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Deadlock

<0:4.14.238-182.421.amzn2
  • H
Improper Input Validation

<0:4.14.238-182.421.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • M
NULL Pointer Dereference

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Resource Leak

<0:4.14.238-182.421.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • M
Divide By Zero

<0:4.14.232-176.381.amzn2
  • M
NULL Pointer Dereference

<0:4.14.232-176.381.amzn2
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.14.336-257.562.amzn2
  • H
Improper Update of Reference Count

<0:4.14.336-257.562.amzn2
  • H
Off-by-one Error

<0:4.14.336-257.562.amzn2
  • H
Use After Free

<0:4.14.336-256.559.amzn2
  • H
Out-of-Bounds

<0:4.14.336-255.557.amzn2
  • H
Out-of-bounds Write

<0:4.14.336-255.557.amzn2
  • M
Out-of-bounds Write

<0:4.14.305-227.531.amzn2
  • H
Race Condition

<0:4.14.336-255.557.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Deadlock

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Race Condition

<0:4.14.299-223.520.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Resource Exhaustion

<0:4.14.281-212.502.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
Out-of-bounds Read

<0:4.14.336-253.554.amzn2
  • H
Resource Exhaustion

<0:4.14.334-252.552.amzn2
  • H
Memory Leak

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.334-252.552.amzn2
  • H
Race Condition

<0:4.14.334-252.552.amzn2
  • M
Use After Free

<0:4.14.330-250.540.amzn2
  • H
Integer Underflow

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Use After Free

<0:4.14.328-248.540.amzn2
  • H
Out-of-bounds Write

<0:4.14.328-248.540.amzn2
  • M
Resource Exhaustion

<0:4.14.327-246.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Buffer Overflow

<0:4.14.326-245.539.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.309-231.529.amzn2
  • H
Out-of-bounds Read

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.262-200.489.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
NULL Pointer Dereference

<0:4.14.322-244.536.amzn2
  • H
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Out-of-bounds Read

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
Use After Free

<0:4.14.326-245.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.326-245.539.amzn2
  • M
Divide By Zero

<0:4.14.322-244.539.amzn2
  • H
Information Exposure

<0:4.14.320-243.544.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • M
Use After Free

<0:4.14.322-244.536.amzn2
  • M
Out-of-Bounds

<0:4.14.322-244.536.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • M
Sensitive Information Uncleared Before Release

<0:4.14.276-211.499.amzn2
  • H
Use After Free

<0:4.14.320-243.544.amzn2
  • H
Double Free

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.320-243.544.amzn2
  • H
Out-of-bounds Write

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.320-242.534.amzn2
  • H
Use After Free

<0:4.14.320-242.534.amzn2
  • H
Out-of-bounds Write

<0:4.14.318-240.529.amzn2
  • H
Race Condition

<0:4.14.313-235.533.amzn2
  • H
Incorrect Bitwise Shift of Integer

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Externally Controlled Reference to a Resource in Another Sphere

<0:4.14.304-226.531.amzn2
  • H
Out-of-Bounds

<0:4.14.241-184.433.amzn2
  • H
CVE-2022-20565

<0:4.14.198-152.320.amzn2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.14.318-241.531.amzn2
  • H
Out-of-bounds Read

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Improper Resource Locking

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Comparison Using Wrong Factors

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.318-240.529.amzn2
  • H
Use After Free

<0:4.14.313-235.533.amzn2
  • H
Use After Free

<0:4.14.314-238.539.amzn2
  • M
Out-of-bounds Write

<0:4.14.314-237.533.amzn2
  • M
Use After Free

<0:4.14.314-237.533.amzn2
  • H
Execution with Unnecessary Privileges

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Out-of-bounds Read

<0:4.14.313-235.533.amzn2
  • H
Sensitive Information Uncleared Before Release

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.309-231.529.amzn2
  • H
Out-of-Bounds

<0:4.14.309-231.529.amzn2
  • H
NULL Pointer Dereference

<0:4.14.309-231.529.amzn2
  • H
Resource Leak

<0:4.14.304-226.531.amzn2
  • H
Incorrect Conversion between Numeric Types

<0:4.14.281-212.502.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Deadlock

<0:4.14.304-226.531.amzn2
  • H
Double Free

<0:4.14.309-231.529.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Incomplete Cleanup

<0:4.14.186-146.268.amzn2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
NULL Pointer Dereference

<0:4.14.304-226.531.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.304-226.531.amzn2
  • H
Arbitrary Code Injection

<0:4.14.304-226.531.amzn2
  • M
Improper Locking

<0:4.14.248-189.473.amzn2
  • M
Missing Initialization of Resource

<0:4.14.248-189.473.amzn2
  • M
Use After Free

<0:4.14.248-189.473.amzn2
  • H
Access of Uninitialized Pointer

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Race Condition

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Use After Free

<0:4.14.301-224.520.amzn2
  • H
Memory Leak

<0:4.14.301-224.520.amzn2
  • H
Use After Free

<0:4.14.299-223.520.amzn2
  • H
Information Exposure

<0:4.14.299-223.520.amzn2
  • H
Out-of-bounds Write

<0:4.14.299-223.520.amzn2
  • H
Improper Initialization

<0:4.14.296-222.539.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.296-222.539.amzn2
  • H
Improper Update of Reference Count

<0:4.14.296-222.539.amzn2
  • H
Memory Leak

<0:4.14.296-222.539.amzn2
  • H
Logging of Excessive Data

<0:4.14.296-222.539.amzn2
  • H
NULL Pointer Dereference

<0:4.14.296-222.539.amzn2
  • H
Out-of-bounds Write

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Improper Update of Reference Count

<0:4.14.294-220.533.amzn2
  • H
Improper Locking

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Incomplete Cleanup

<0:4.14.294-220.533.amzn2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.14.294-220.533.amzn2
  • H
CVE-2022-36946

<0:4.14.294-220.533.amzn2
  • H
NULL Pointer Dereference

<0:4.14.294-220.533.amzn2
  • H
Use After Free

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.294-220.533.amzn2
  • H
Race Condition

<0:4.14.294-220.533.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Privilege Dropping / Lowering Errors

<0:4.14.133-113.105.amzn2
  • H
CVE-2022-36946

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Information Exposure

<0:4.14.291-218.527.amzn2
  • H
Integer Underflow

<0:4.14.291-218.527.amzn2
  • H
NULL Pointer Dereference

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Use After Free

<0:4.14.291-218.527.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • H
Incomplete Cleanup

<0:4.14.285-215.501.amzn2
  • M
Incomplete Cleanup

<0:4.14.290-217.505.amzn2
  • M
Out-of-bounds Write

<0:4.14.290-217.505.amzn2
  • M
Improper Update of Reference Count

<0:4.14.290-217.505.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Information Exposure

<0:4.14.287-215.504.amzn2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.287-215.504.amzn2
  • H
CVE-2022-33744

<0:4.14.287-215.504.amzn2
  • H
Memory Leak

<0:4.14.287-215.504.amzn2
  • H
Use After Free

<0:4.14.287-215.504.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.285-215.501.amzn2
  • H
Buffer Overflow

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.285-215.501.amzn2
  • H
Information Exposure

<0:4.14.285-215.501.amzn2
  • H
Memory Leak

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Use After Free

<0:4.14.285-215.501.amzn2
  • H
Incorrect Default Permissions

<0:4.14.281-212.502.amzn2
  • H
Race Condition

<0:4.14.281-212.502.amzn2
  • H
Use After Free

<0:4.14.281-212.502.amzn2
  • H
NULL Pointer Dereference

<0:4.14.281-212.502.amzn2
  • H
Memory Leak

<0:4.14.281-212.502.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.14.276-211.499.amzn2
  • M
Double Free

<0:4.14.276-211.499.amzn2
  • M
NULL Pointer Dereference

<0:4.14.276-211.499.amzn2
  • M
Use After Free

<0:4.14.276-211.499.amzn2
  • H
CVE-2022-28356

<0:4.14.275-207.503.amzn2
  • H
Heap-based Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Buffer Overflow

<0:4.14.275-207.503.amzn2
  • H
Out-of-bounds Write

<0:4.14.273-207.502.amzn2
  • H
Missing Initialization of Resource

<0:4.14.273-207.502.amzn2
  • H
CVE-2022-23960

<0:4.14.268-205.500.amzn2
  • H
CVE-2021-26401

<0:4.14.268-205.500.amzn2
  • H
Exposure of Resource to Wrong Sphere

<0:4.14.268-205.500.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
NULL Pointer Dereference

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0002

<0:4.14.268-205.500.amzn2
  • H
Out-of-bounds Write

<0:4.14.268-205.500.amzn2
  • H
Improper Preservation of Permissions

<0:4.14.268-205.500.amzn2
  • H
CVE-2022-0001

<0:4.14.268-205.500.amzn2
  • H
Improper Authentication

<0:4.14.268-205.500.amzn2
  • H
Improper Initialization

<0:4.14.268-205.500.amzn2
  • H
Buffer Overflow

<0:4.14.268-205.500.amzn2
  • H
Incomplete Cleanup

<0:4.14.268-205.500.amzn2
  • H
Missing Authorization

<0:4.14.262-200.489.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.262-200.489.amzn2
  • H
Incorrect Calculation of Buffer Size

<0:4.14.262-200.489.amzn2
  • H
Race Condition

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Resource Exhaustion

<0:4.14.262-200.489.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.262-200.489.amzn2
  • M
Incomplete Cleanup

<0:4.14.256-197.484.amzn2
  • M
Improper Validation of Integrity Check Value

<0:4.14.256-197.484.amzn2
  • M
Race Condition

<0:4.14.256-197.484.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.252-195.481.amzn2
  • H
CVE-2021-38300

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Memory Leak

<0:4.14.252-195.481.amzn2
  • H
Double Free

<0:4.14.252-195.481.amzn2
  • H
Race Condition

<0:4.14.252-195.481.amzn2
  • H
Improper Initialization

<0:4.14.252-195.481.amzn2
  • M
Race Condition

<0:4.14.248-189.473.amzn2
  • M
Race Condition

<0:4.14.246-187.474.amzn2
  • M
Out-of-bounds Read

<0:4.14.246-187.474.amzn2
  • M
CVE-2021-38198

<0:4.14.246-187.474.amzn2
  • M
Information Exposure

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • M
Missing Authorization

<0:4.14.246-187.474.amzn2
  • H
Out-of-Bounds

<0:4.14.243-185.433.amzn2
  • H
Missing Initialization of Resource

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Information Exposure

<0:4.14.241-184.433.amzn2
  • H
Buffer Overflow

<0:4.14.238-182.422.amzn2
  • H
Double Free

<0:4.14.238-182.421.amzn2
  • H
Information Exposure

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Use After Free

<0:4.14.238-182.421.amzn2
  • H
Race Condition

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Authentication

<0:4.14.238-182.421.amzn2
  • H
Improper Locking

<0:4.14.238-182.421.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-177.418.amzn2
  • M
Incorrect Authorization

<0:4.14.232-176.381.amzn2
  • M
Out-of-bounds Read

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • M
Race Condition

<0:4.14.232-176.381.amzn2
  • L
ALAS2-2021-1634

<0:4.14.231-173.361.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
CVE-2021-29647

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Arbitrary Command Injection

<0:4.14.231-173.360.amzn2
  • H
Race Condition

<0:4.14.231-173.360.amzn2
  • H
Improper Initialization

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Buffer Overflow

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Use After Free

<0:4.14.231-173.360.amzn2
  • H
Off-by-one Error

<0:4.14.231-173.360.amzn2
  • H
Numeric Errors

<0:4.14.231-173.360.amzn2
  • H
Memory Leak

<0:4.14.231-173.360.amzn2
  • H
Out-of-bounds Write

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-27363

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
Out-of-bounds Read

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26932

<0:4.14.225-168.357.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.225-168.357.amzn2
  • H
CVE-2021-26930

<0:4.14.225-168.357.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Race Condition

<0:4.14.219-161.340.amzn2
  • H
Directory Traversal

<0:4.14.219-161.340.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.214-160.339.amzn2
  • H
Out-of-bounds Write

<0:4.14.214-160.339.amzn2
  • H
Out-of-Bounds

<0:4.14.214-160.339.amzn2
  • H
Use After Free

<0:4.14.214-160.339.amzn2
  • H
CVE-2020-8694

<0:4.14.209-160.335.amzn2
  • H
Out-of-bounds Read

<0:4.14.209-160.335.amzn2
  • H
Release of Invalid Pointer or Reference

<0:4.14.209-160.335.amzn2
  • H
Missing Authorization

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-27673

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Race Condition

<0:4.14.209-160.335.amzn2
  • H
Resource Exhaustion

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
Use After Free

<0:4.14.209-160.335.amzn2
  • H
CVE-2020-24490

<0:4.14.203-156.332.amzn2
  • H
Improper Input Validation

<0:4.14.203-156.332.amzn2
  • H
Missing Initialization of Resource

<0:4.14.203-156.332.amzn2
  • H
Use After Free

<0:4.14.203-156.332.amzn2
  • H
Buffer Overflow

<0:4.14.203-156.332.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.200-155.322.amzn2
  • H
Incorrect Authorization

<0:4.14.200-155.322.amzn2
  • H
Improper Input Validation

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.200-155.322.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Buffer Overflow

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.198-152.320.amzn2
  • H
Race Condition

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Read

<0:4.14.198-152.320.amzn2
  • H
Use After Free

<0:4.14.198-152.320.amzn2
  • H
Out-of-bounds Write

<0:4.14.193-149.317.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Race Condition

<0:4.14.192-147.314.amzn2
  • H
Out-of-bounds Read

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Resource Exhaustion

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
Memory Leak

<0:4.14.192-147.314.amzn2
  • H
NULL Pointer Dereference

<0:4.14.192-147.314.amzn2
  • H
CVE-2017-18232

<0:4.14.192-147.314.amzn2
  • H
Improper Locking

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10768

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10766

<0:4.14.186-146.268.amzn2
  • H
Out-of-Bounds

<0:4.14.186-146.268.amzn2
  • H
NULL Pointer Dereference

<0:4.14.186-146.268.amzn2
  • H
CVE-2020-10767

<0:4.14.186-146.268.amzn2
  • H
Information Exposure

<0:4.14.186-146.268.amzn2
  • H
Improper Input Validation

<0:4.14.186-146.268.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.177-139.253.amzn2
  • H
Use After Free

<0:4.14.177-139.253.amzn2
  • H
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.14.181-140.257.amzn2
  • H
CVE-2020-12770

<0:4.14.181-140.257.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.181-140.257.amzn2
  • H
Use After Free

<0:4.14.181-140.257.amzn2
  • H
Out-of-bounds Write

<0:4.14.181-140.257.amzn2
  • H
NULL Pointer Dereference

<0:4.14.177-139.254.amzn2
  • H
Use After Free

<0:4.14.173-137.228.amzn2
  • H
Information Exposure

<0:4.14.173-137.228.amzn2
  • H
Out-of-bounds Write

<0:4.14.173-137.228.amzn2
  • H
Memory Leak

<0:4.14.171-136.231.amzn2
  • H
Out-of-bounds Read

<0:4.14.171-136.231.amzn2
  • H
Memory Leak

<0:4.14.165-131.185.amzn2
  • H
Out-of-bounds Write

<0:4.14.165-131.185.amzn2
  • H
Improper Input Validation

<0:4.14.154-128.181.amzn2
  • M
CVE-2019-11135

<0:4.14.152-127.182.amzn2
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.14.152-127.182.amzn2
  • H
Buffer Overflow

<0:4.14.146-119.123.amzn2
  • H
Out-of-bounds Write

<0:4.14.146-119.123.amzn2
  • M
Out-of-bounds Write

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.143-118.123.amzn2
  • M
Information Exposure

<0:4.14.67-71.56.amzn2
  • M
Out-of-bounds Write

<0:4.14.67-71.56.amzn2
  • L
Information Exposure

<0:4.14.77-80.57.amzn2
  • L
Out-of-bounds Write

<0:4.14.55-68.37.amzn2
  • M
CVE-2019-1125

<0:4.14.133-113.112.amzn2
  • H
Improper Locking

<0:4.14.133-113.105.amzn2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.14.133-113.105.amzn2
  • C
Allocation of Resources Without Limits or Throttling

<0:4.14.123-111.109.amzn2
  • C
Integer Overflow or Wraparound

<0:4.14.123-111.109.amzn2
  • C
Resource Exhaustion

<0:4.14.123-111.109.amzn2
  • H
Cleartext Transmission of Sensitive Information

<0:4.14.121-109.96.amzn2
  • H
Out-of-bounds Write

<0:4.14.121-109.96.amzn2
  • H
Allocation of Resources Without Limits or Throttling

<0:4.14.121-109.96.amzn2
  • H
CVE-2019-11884

<0:4.14.121-109.96.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.121-109.96.amzn2
  • H
Use of Uninitialized Resource

<0:4.14.121-109.96.amzn2
  • H
Race Condition

<0:4.14.114-105.126.amzn2
  • H
CVE-2019-11091

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Information Exposure

<0:4.14.114-105.126.amzn2
  • H
Numeric Errors

<0:4.14.114-103.97.amzn2
  • H
Out-of-bounds Read

<0:4.14.114-103.97.amzn2
  • H
Improper Input Validation

<0:4.14.114-103.97.amzn2
  • H
NULL Pointer Dereference

<0:4.14.106-97.85.amzn2
  • H
Memory Leak

<0:4.14.106-97.85.amzn2
  • H
CVE-2019-7222

<0:4.14.101-91.76.amzn2
  • H
Use After Free

<0:4.14.104-95.84.amzn2
  • H
Use After Free

<0:4.14.101-91.76.amzn2
  • H
Race Condition

<0:4.14.101-91.76.amzn2
  • M
Resource Exhaustion

<0:4.14.88-88.76.amzn2
  • H
Use After Free

<0:4.14.94-89.73.amzn2
  • M
Race Condition

<0:4.14.88-88.76.amzn2
  • M
NULL Pointer Dereference

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Information Exposure

<0:4.14.88-88.73.amzn2
  • M
Improper Input Validation

<0:4.14.77-80.57.amzn2
  • M
Race Condition

<0:4.14.77-80.57.amzn2
  • H
Integer Overflow or Wraparound

<0:4.14.15-46.13.amzn2
  • H
Information Exposure

<0:4.14.72-73.55.amzn2
  • H
Use After Free

<0:4.14.72-73.55.amzn2
  • H
Out-of-bounds Write

<0:4.14.72-73.55.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Improper Input Validation

<0:4.14.62-70.117.amzn2
  • C
CVE-2018-3646

<0:4.14.62-70.117.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • L
NULL Pointer Dereference

<0:4.14.59-68.43.amzn2
  • C
Information Exposure

<0:4.14.62-70.117.amzn2
  • C
Resource Exhaustion

<0:4.14.59-68.43.amzn2
  • M
Use After Free

<0:4.14.55-68.37.amzn2
  • M
Race Condition

<0:4.14.51-66.38.amzn2
  • H
CVE-2018-3693

<0:4.14.47-63.37.amzn2
  • H
Information Exposure

<0:4.14.47-63.37.amzn2
  • H
Out-of-Bounds

<0:4.14.47-63.37.amzn2
  • H
Race Condition

<0:4.14.42-61.37.amzn2
  • H
Use of Insufficiently Random Values

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.42-61.37.amzn2
  • H
CVE-2018-1087

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Out-of-Bounds

<0:4.14.42-61.37.amzn2
  • H
Use After Free

<0:4.14.42-61.37.amzn2
  • H
Out-of-bounds Write

<0:4.14.33-59.34.amzn2
  • H
Race Condition

<0:4.14.33-59.34.amzn2
  • H
CVE-2018-10901

<0:4.14.33-59.34.amzn2
  • H
CVE-2017-13215

<0:4.14.33-59.34.amzn2
  • H
Use After Free

<0:4.14.33-59.34.amzn2
  • H
Out-of-bounds Write

<0:4.9.85-47.59.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.9.81-44.57.amzn2
  • H
Use After Free

<0:4.9.81-44.57.amzn2
  • H
Information Exposure

<0:4.9.81-44.57.amzn2
  • H
Out-of-bounds Read

<0:4.9.81-44.57.amzn2
  • H
Race Condition

<0:4.9.81-44.57.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2
  • C
Information Exposure

<0:4.9.76-38.79.amzn2