kernel-tools-libs-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-tools-libs-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2024-27388

*
  • M
CVE-2024-27010

*
  • M
CVE-2024-26982

*
  • M
CVE-2024-27052

*
  • M
CVE-2024-26960

*
  • M
CVE-2024-27014

*
  • M
CVE-2024-27048

*
  • M
CVE-2024-26933

*
  • M
CVE-2024-27059

*
  • M
CVE-2024-26938

*
  • M
CVE-2024-26974

*
  • M
CVE-2024-26999

*
  • M
CVE-2024-27017

*
  • M
CVE-2024-26935

*
  • M
CVE-2024-26940

*
  • M
CVE-2024-26961

*
  • M
CVE-2024-27023

*
  • M
CVE-2024-27002

*
  • M
CVE-2024-27075

*
  • M
CVE-2024-27019

*
  • M
CVE-2024-27042

*
  • M
CVE-2024-26930

*
  • M
CVE-2024-27056

*
  • M
CVE-2024-27055

*
  • M
CVE-2024-26929

*
  • M
CVE-2024-27065

*
  • M
CVE-2024-27020

*
  • M
CVE-2024-27047

*
  • M
CVE-2024-27025

*
  • M
CVE-2024-27004

*
  • M
CVE-2024-26939

*
  • M
CVE-2024-26962

*
  • M
CVE-2024-27057

*
  • M
CVE-2024-27062

*
  • M
CVE-2024-27013

*
  • M
CVE-2024-26976

*
  • M
CVE-2024-26964

*
  • M
CVE-2024-26993

*
  • M
CVE-2024-26958

*
  • M
CVE-2024-27073

*
  • M
CVE-2024-27000

*
  • M
CVE-2024-27011

*
  • M
CVE-2024-26973

*
  • M
CVE-2024-26984

*
  • M
CVE-2023-52653

*
  • M
CVE-2024-26934

*
  • M
CVE-2024-26931

*
  • M
CVE-2023-52648

*
  • M
CVE-2022-48669

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • L
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • M
Deadlock

*
  • M
CVE-2024-26927

*
  • M
CVE-2023-52646

*
  • M
CVE-2022-48659

*
  • M
CVE-2022-48650

*
  • M
CVE-2022-48637

*
  • M
CVE-2022-48643

*
  • M
CVE-2022-48647

*
  • M
CVE-2022-48653

*
  • M
CVE-2022-48649

*
  • M
CVE-2022-48641

*
  • M
CVE-2022-48642

*
  • M
CVE-2022-48634

*
  • M
CVE-2022-48662

*
  • M
CVE-2022-48652

*
  • M
CVE-2022-48632

*
  • M
CVE-2022-48663

*
  • M
CVE-2022-48658

*
  • M
CVE-2022-48638

*
  • M
CVE-2022-48639

*
  • M
CVE-2022-48666

*
  • M
CVE-2022-48633

*
  • M
CVE-2022-48635

*
  • M
CVE-2022-48651

*
  • M
CVE-2022-48648

*
  • M
CVE-2022-48646

*
  • M
CVE-2022-48640

*
  • M
CVE-2022-48631

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Race Condition

*
  • L
Race Condition

*
  • L
Improper Input Validation

*
  • M
CVE-2024-26783

*
  • M
Use After Free

*
  • M
Improper Locking

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
CVE-2024-26921

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • M
CVE-2024-26915

*
  • M
Stack-based Buffer Overflow

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
CVE-2024-26916

*
  • L
Memory Leak

*
  • L
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Race Condition

*
  • M
Integer Underflow

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Stack-based Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
Stack-based Buffer Overflow

*
  • L
Race Condition

*
  • M
Improper Input Validation

*
  • L
Resource Injection

*
  • M
Improper Input Validation

*
  • M
CVE-2024-26919

*
  • L
Resource Leak

*
  • L
Race Condition

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • L
Data Element containing Pointer Item without Proper Copy Control Element

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • M
Deadlock

*
  • L
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • L
Use After Free

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Excessive Platform Resource Consumption within a Loop

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • M
CVE-2024-26801

*
  • L
CVE-2024-26782

*
  • M
CVE-2024-26803

*
  • M
CVE-2024-26804

*
  • M
Race Condition

*
  • M
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Deadlock

*
  • M
CVE-2024-26742

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Improper Null Termination

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Null Termination

*
  • L
Improper Null Termination

*
  • M
Double Free

*
  • M
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Write-what-where Condition

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2024-26735

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-26733

*
  • L
Unchecked Input for Loop Condition

*
  • L
Improper Input Validation

*
  • L
Divide By Zero

*
  • M
Improper Handling of Values

*
  • M
Improper Handling of Values

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Deadlock

*
  • M
CVE-2024-26744

*
  • M
Improper Resource Locking

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2024-26739

*
  • L
Deadlock

*
  • M
CVE-2024-26743

*
  • M
CVE-2024-26740

*
  • L
Race Condition

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • M
Out-of-Bounds

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • L
Unchecked Input for Loop Condition

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Locking

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Resource Injection

*
  • M
Improper Resource Locking

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • L
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
Out-of-bounds Read

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
Non-exit on Failed Initialization

*
  • L
Resource Injection

*
  • M
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Improper Input Validation

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Resource Leak

*
  • L
Missing Initialization of a Variable

*
  • M
Deadlock

*
  • L
Deadlock

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • M
Use of NullPointerException Catch to Detect NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Deadlock

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Improper Input Validation

*
  • M
Improper Resource Locking

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • L
Improper Resource Locking

*
  • M
Use After Free

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
Race Condition

*
  • M
Integer Overflow to Buffer Overflow

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Return of Stack Variable Address

*
  • L
Improper Resource Shutdown or Release

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Improper Resource Locking

*
  • M
Resource Leak

*
  • M
Improper Input Validation

*
  • L
Double Free

*
  • L
Use of Uninitialized Variable

*
  • M
CVE-2023-52575

*
  • L
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Out-of-bounds Read

*
  • M
Race Condition

*
  • H
Memory Leak

<0:4.18.0-513.9.1.el8_9
  • L
Use After Free

*
  • M
Unchecked Return Value

*
  • M
CVE-2023-52520

*
  • M
Resource Injection

*
  • L
Missing Encryption of Sensitive Data

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • M
Race Condition

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Divide By Zero

*
  • M
Use After Free

*
  • M
CVE-2024-26615

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2021-47018

*
  • L
Improper Input Validation

*
  • M
Memory Leak

*
  • M
Out-of-bounds Read

*
  • M
Deadlock

*
  • M
Out-of-Bounds

*
  • M
Deadlock

*
  • M
Improper Input Validation

*
  • M
Resource Leak

*
  • M
Information Exposure Through Indexing of Private Data

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • L
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • M
Deadlock

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Missing Support for Integrity Check

*
  • M
Use After Free

*
  • L
CVE-2021-46914

*
  • L
Stack-based Buffer Overflow

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Range Error

*
  • M
Improper Input Validation

*
  • L
CVE-2021-46922

*
  • M
Divide By Zero

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Unchecked Error Condition

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
CVE-2023-52474

*
  • M
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2023-52462

*
  • L
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Use After Free

*
  • M
Untrusted Pointer Dereference

*
  • L
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
Return of Wrong Status Code

*
  • M
Race Condition

*
  • M
Race Condition

*
  • L
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Improper Authentication

*
  • M
CVE-2024-25741

*
  • M
CVE-2024-25744

*
  • M
Memory Leak

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
Stack-based Buffer Overflow

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

*
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • L
Information Exposure

*
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-513.24.1.el8_9
  • M
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Improper Handling of Values

*
  • H
Integer Underflow

<0:4.18.0-513.24.1.el8_9
  • M
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • H
Resource Leak

<0:4.18.0-513.5.1.el8_9
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
Race Condition

*
  • H
Race Condition

<0:4.18.0-513.24.1.el8_9
  • L
NULL Pointer Dereference

*
  • H
Out-of-bounds Write

<0:4.18.0-513.24.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Man-in-the-Middle (MitM)

*
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • M
NULL Pointer Dereference

*
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • H
Out-of-Bounds

<0:4.18.0-477.27.1.el8_8
  • M
Race Condition

*
  • L
Use After Free

*
  • M
Improper Handling of Exceptional Conditions

*
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Improper Privilege Management

<0:4.18.0-513.18.1.el8_9
  • H
Improper Update of Reference Count

<0:4.18.0-513.11.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Out-of-bounds Write

*
  • H
Buffer Overflow

<0:4.18.0-513.18.1.el8_9
  • H
Double Free

<0:4.18.0-513.9.1.el8_9
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • H
Integer Underflow

<0:4.18.0-513.11.1.el8_9
  • H
Incorrect Calculation

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Improper Access Control

*
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.11.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.5.1.el8_9
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-513.5.1.el8_9
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Improper Zeroization of Hardware Register

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • M
Information Exposure

*
  • H
Out-of-bounds Read

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Resource Exhaustion

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • L
NULL Pointer Dereference

*
  • H
Resource Leak

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.5.1.el8_9
  • L
Use After Free

*
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Incorrect Bitwise Shift of Integer

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-31084

<0:4.18.0-513.5.1.el8_9
  • M
Divide By Zero

*
  • M
Race Condition

*
  • M
Release of Invalid Pointer or Reference

*
  • H
Use After Free

<0:4.18.0-305.el8
  • M
Sensitive Information Uncleared Before Release

*
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-477.27.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Improper Resource Locking

<0:4.18.0-513.5.1.el8_9
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-477.10.1.el8_8
  • H
Improperly Implemented Security Check for Standard

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.21.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-477.21.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.1.el8_9
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-513.5.1.el8_9
  • M
Incorrect Authorization

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • M
Double Free

*
  • H
Interpretation Conflict

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-477.27.1.el8_8
  • M
Out-of-bounds Read

*
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Improper Ownership Management

<0:4.18.0-425.19.2.el8_7
  • L
Improper Initialization

*
  • M
Use After Free

<0:4.18.0-477.15.1.el8_8
  • H
Excessive Platform Resource Consumption within a Loop

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • L
Externally Controlled Reference to a Resource in Another Sphere

*
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Write-what-where Condition

<0:4.18.0-477.10.1.el8_8
  • L
Use After Free

*
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • L
Memory Leak

*
  • H
Non-exit on Failed Initialization

<0:4.18.0-477.10.1.el8_8
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Logging of Excessive Data

<0:4.18.0-513.5.1.el8_9
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
Buffer Overflow

<0:4.18.0-425.19.2.el8_7
  • M
Integer Overflow or Wraparound

*
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • M
Use After Free

*
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • M
Race Condition

*
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Improper Preservation of Permissions

<0:4.18.0-425.10.1.el8_7
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • M
Race Condition

*
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Access of Uninitialized Pointer

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition During Access to Alternate Channel

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • M
Information Exposure

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Information Exposure

<0:4.18.0-372.32.1.el8_6
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • L
Expected Behavior Violation

*
  • H
Incorrect Control Flow Scoping

<0:4.18.0-477.10.1.el8_8
  • H
Improper Input Validation

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.24.1.el8_9
  • H
Integer Overflow or Wraparound

<0:4.18.0-513.11.1.el8_9
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • L
Race Condition

*
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Expected Behavior Violation

<0:4.18.0-477.10.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • L
Out-of-bounds Read

*
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Improper Update of Reference Count

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Use After Free

<0:4.18.0-372.32.1.el8_6
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Public Key Re-Use for Signing both Debug and Production Code

*
  • M
Privilege Defined With Unsafe Actions

<0:4.18.0-425.3.1.el8
  • M
Buffer Overflow

<0:4.18.0-425.3.1.el8
  • M
Out-of-bounds Write

*
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Incorrect Default Permissions

<0:4.18.0-477.10.1.el8_8
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • H
Information Exposure

<0:4.18.0-372.19.1.el8_6
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Information Exposure

*
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-372.13.1.el8_6
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • M
Authentication Bypass

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-348.23.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-477.10.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • L
Buffer Overflow

*
  • H
Information Exposure

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • M
Use of Uninitialized Resource

<0:4.18.0-425.3.1.el8
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • M
Information Exposure

*
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Incorrect Conversion between Numeric Types

<0:4.18.0-372.9.1.el8
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • L
Improper Handling of Exceptional Conditions

*
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • M
Memory Leak

*
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • H
Incomplete Cleanup

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Improper Validation of Array Index

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-348.2.1.el8_5
  • M
Use After Free

*
  • H
Unchecked Return Value

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • L
Information Exposure

*
  • M
Cleartext Transmission of Sensitive Information

*
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • M
Out-of-bounds Read

*
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
Race Condition

*
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

*
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • L
Improper Initialization

*
  • M
Integer Overflow or Wraparound

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Improper Input Validation

<0:4.18.0-305.17.1.el8_4
  • M
Unchecked Return Value

<0:4.18.0-348.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-305.10.2.el8_4
  • H
Improper Verification of Cryptographic Signature

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Out-of-Bounds

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-240.22.1.el8_3
  • H
Race Condition

<0:4.18.0-240.22.1.el8_3
  • H
Improper Initialization

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • H
Heap-based Buffer Overflow

<0:4.18.0-240.1.1.el8_3
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Missing Initialization of Resource

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Operation on a Resource after Expiration or Release

<0:4.18.0-240.el8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-193.28.1.el8_2
  • H
Improper Access Control

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • M
Improper Access Control

<0:4.18.0-193.14.3.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Expected Behavior Violation

<0:4.18.0-193.13.2.el8_2
  • H
Uncaught Exception

<0:4.18.0-193.13.2.el8_2
  • H
Heap-based Buffer Overflow

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Mirrored Regions with Different Values

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
Missing Release of Resource after Effective Lifetime

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Information Exposure

<0:4.18.0-240.22.1.el8_3
  • H
Execution with Unnecessary Privileges

<0:4.18.0-240.22.1.el8_3
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • M
Improper Input Validation

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Covert Timing Channel

<0:4.18.0-147.5.1.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • M
Information Exposure

<0:4.18.0-240.el8
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Resource Exhaustion

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Improper Locking

<0:4.18.0-240.15.1.el8_3
  • H
Improper Access Control

<0:4.18.0-147.0.3.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-147.0.2.el8_1
  • H
Improper Access Control

<0:4.18.0-147.0.2.el8_1
  • H
Out-of-Bounds

<0:4.18.0-240.10.1.el8_3
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • M
Information Exposure

<0:4.18.0-240.8.1.el8_3
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • M
Arbitrary Code Injection

<0:4.18.0-240.el8
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Improper Input Validation

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Expected Behavior Violation

<0:4.18.0-193.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-193.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Information Exposure

<0:4.18.0-193.el8
  • H
Execution with Unnecessary Privileges

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-305.el8
  • H
Buffer Overflow

<0:4.18.0-193.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • M
Null Byte Interaction Error (Poison Null Byte)

<0:4.18.0-240.el8
  • M
Resource Injection

<0:4.18.0-240.el8
  • H
Improper Access Control

<0:4.18.0-305.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • H
Incorrect Check of Function Return Value

<0:4.18.0-147.el8
  • H
Improper Cleanup on Thrown Exception

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Out-of-Bounds

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • M
Resource Exhaustion

<0:4.18.0-240.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Insufficient Entropy

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Missing Initialization of a Variable

<0:4.18.0-147.el8
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-Bounds

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Privilege Dropping / Lowering Errors

<0:4.18.0-80.7.2.el8_0
  • H
Covert Timing Channel

<0:4.18.0-80.7.2.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Use After Free

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • H
Sensitive Information Uncleared Before Release

<0:4.18.0-80.1.2.el8_0
  • M
Missing Initialization of Resource

*
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • H
Improper Input Validation

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Improper Initialization

*
  • M
Incorrect Conversion between Numeric Types

*
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • M
Out-of-Bounds

*
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Information Exposure

<0:4.18.0-348.el8
  • M
Directory Traversal

*
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-425.3.1.el8
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Incorrect Authorization

<0:4.18.0-305.12.1.el8_4
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • M
Untrusted Pointer Dereference

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • H
Buffer Overflow

<0:4.18.0-305.25.1.el8_4
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Access Control

*
  • H
Information Exposure

<0:4.18.0-372.9.1.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-348.el8
  • L
CVE-2020-36311

*
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • L
Incorrect Authorization

*
  • M
Improper Locking

<0:4.18.0-348.el8
  • M
Race Condition

*
  • M
Race Condition

<0:4.18.0-348.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • M
Out-of-bounds Read

*
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
Integer Underflow

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Improper Restriction of Excessive Authentication Attempts

<0:4.18.0-348.el8
  • M
Authentication Bypass

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Origin Validation Error

<0:4.18.0-348.el8
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:4.18.0-348.el8
  • M
Use After Free

*
  • M
Cleartext Transmission of Sensitive Information

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Insufficient Verification of Data Authenticity

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • L
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Race Condition

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Memory Leak

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Authentication Bypass

*
  • M
Information Exposure

<0:4.18.0-348.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • M
Resource Exhaustion

*
  • M
Authentication Bypass by Primary Weakness

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Race Condition

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Information Exposure

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Incorrect Check of Function Return Value

*
  • M
Operation on a Resource after Expiration or Release

*
  • M
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

*
  • L
Unchecked Return Value

*
  • L
Unchecked Return Value

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*