linux-vmware-6.18 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the linux-vmware-6.18 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-jw6w-m4jf-m6xp

<6.18.5-r2
  • H
Cleartext Transmission of Sensitive Information

<6.18.5-r2
  • H
Use After Free

<6.18.5-r2
  • L
GHSA-f7qv-v8h9-5244

<6.18.5-r2
  • M
Out-of-bounds Read

<6.18.5-r2
  • L
GHSA-wjv9-48rg-r5cr

<6.18.5-r2
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

<6.18.5-r2
  • L
GHSA-2m35-m4g6-x835

<6.18.5-r2
  • M
Out-of-bounds Write

<6.18.5-r2
  • L
GHSA-jr4h-682w-x2ph

<6.18.5-r2
  • M
Integer Overflow or Wraparound

<6.18.5-r2
  • M
Use After Free

<6.18.5-r2
  • L
GHSA-3c7w-rm52-555g

<6.18.5-r2
  • L
GHSA-35v2-jpj3-grq4

<6.18.5-r2
  • L
GHSA-9qrv-rvg6-cq37

<6.18.5-r2
  • M
NULL Pointer Dereference

<6.18.5-r2
  • M
Out-of-bounds Write

<6.18.5-r2
  • L
GHSA-4hgp-5v89-5fhw

<6.18.5-r2
  • L
GHSA-xcq5-jm7f-rp35

<6.18.5-r2
  • M
Out-of-bounds Write

<6.18.5-r2
  • L
GHSA-xw94-39m9-7c49

<6.18.5-r2
  • L
GHSA-7f5q-x8vx-pfrp

<6.18.5-r2
  • L
GHSA-74xp-vm35-rpjw

<6.18.5-r2
  • M
Race Condition

<6.18.5-r2
  • L
GHSA-g7mw-cr59-r458

<6.18.5-r2
  • M
Memory Leak

<6.18.5-r2
  • L
GHSA-vw35-vgjr-5jhv

<6.18.5-r2
  • M
Arbitrary Code Injection

<6.18.5-r2
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<6.18.5-r2
  • M
Out-of-Bounds

<6.18.5-r2
  • H
Improper Input Validation

<6.18.5-r2
  • L
GHSA-q6f7-v272-hqqq

<6.18.5-r2
  • M
Memory Leak

<6.18.5-r2
  • L
GHSA-pvv9-p2gj-w426

<6.18.5-r2
  • L
GHSA-h2j4-qp68-f436

<6.18.5-r2
  • M
Buffer Overflow

<6.18.5-r2
  • H
CVE-2023-39180

<6.18.5-r2
  • M
Improper Initialization

<6.18.5-r2
  • H
Access Restriction Bypass

<6.18.5-r2
  • L
GHSA-3xq4-8c55-jfwq

<6.18.5-r2
  • L
GHSA-c8cv-8gr5-5v2w

<6.18.5-r2
  • M
Use After Free

<6.18.5-r2
  • M
NULL Pointer Dereference

<6.18.5-r2
  • L
GHSA-cf7q-h67g-w62q

<6.18.5-r2
  • L
GHSA-vwm6-3cgq-cw2w

<6.18.5-r2
  • M
NULL Pointer Dereference

<6.18.5-r2
  • L
GHSA-pv5f-x9r7-h4c8

<6.18.5-r2
  • M
Information Exposure

<6.18.5-r2
  • M
Improper Resource Shutdown or Release

<6.18.5-r2
  • H
Out-of-Bounds

<6.18.5-r2
  • L
GHSA-xhpr-rjf3-gg6p

<6.18.5-r2
  • L
GHSA-qfg2-8gf5-3xfc

<6.18.5-r2
  • L
GHSA-rwr5-xr2c-7wc8

<6.18.5-r2
  • L
GHSA-p9ch-h5p3-4xcq

<6.18.5-r2
  • L
GHSA-4h2p-5cf9-5j8f

<6.18.5-r2
  • L
GHSA-7w7v-hmqg-8956

<6.18.5-r2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<6.18.5-r2
  • L
GHSA-9gvv-jxrj-2xcq

<6.18.5-r2
  • M
Exposure of Resource to Wrong Sphere

<6.18.5-r2
  • H
Use After Free

<6.18.5-r2
  • L
Memory Leak

<6.18.5-r2
  • L
GHSA-w2v4-mpj8-9x8m

<6.18.5-r2
  • L
GHSA-pw98-cq7c-645p

<6.18.5-r2
  • L
GHSA-cvfm-v88g-pg7v

<6.18.5-r2
  • H
NULL Pointer Dereference

<6.18.5-r2
  • L
GHSA-fw8c-q6fq-37rg

<6.18.5-r2
  • M
Improper Resource Shutdown or Release

<6.18.5-r2
  • L
Memory Leak

<6.18.5-r2
  • L
GHSA-6f7j-jmxj-m9g3

<6.18.5-r2
  • M
Double Free

<6.18.5-r2
  • L
GHSA-wp33-7frp-g7vg

<6.18.5-r2
  • L
GHSA-48h7-cvhw-3w6x

<6.18.5-r2
  • L
GHSA-xm9r-hq6w-wmg8

<6.18.5-r2
  • L
GHSA-2j83-334m-g9w4

<6.18.5-r2
  • H
Out-of-Bounds

<6.18.5-r2
  • L
GHSA-4vrg-gm73-c852

<6.18.5-r2
  • L
GHSA-9vh7-c87x-8q9v

<6.18.5-r2
  • H
Man-in-the-Middle (MitM)

<6.18.5-r2
  • M
Incorrect Authorization

<6.18.5-r2
  • L
GHSA-rw7h-fg8r-3w82

<6.18.5-r2
  • H
Race Condition

<6.18.5-r2
  • L
GHSA-jf42-2pw2-333x

<6.18.5-r2
  • M
NULL Pointer Dereference

<6.18.5-r2
  • M
Access of Uninitialized Pointer

<6.18.5-r2
  • L
GHSA-hcgg-5q2q-c9qf

<6.18.5-r2
  • M
Allocation of Resources Without Limits or Throttling

<6.18.5-r2
  • H
Use After Free

<6.18.5-r2
  • M
Improper Input Validation

<6.18.5-r2
  • M
Race Condition

<6.18.5-r2
  • L
GHSA-78wg-6vv7-mj9q

<6.18.5-r2
  • L
GHSA-mq9x-53x3-39h5

<6.18.5-r2
  • H
Race Condition

<6.18.5-r2
  • M
Out-of-bounds Write

<6.18.5-r2
  • H
CVE-2023-39179

<6.18.5-r2
  • H
Out-of-bounds Read

<6.18.5-r2
  • L
GHSA-fq9v-vwjc-pv76

<6.18.5-r2
  • H
Information Exposure

<6.18.5-r2
  • M
Out-of-Bounds

<6.18.5-r2
  • L
GHSA-9wx5-5c3v-3qmx

<6.18.5-r2
  • H
Use After Free

<6.18.5-r2
  • M
Improper Restriction of Communication Channel to Intended Endpoints

<6.18.5-r2
  • M
Use of Uninitialized Resource

<6.18.5-r2
  • L
GHSA-9682-f2fr-3h46

<6.18.5-r2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<6.18.5-r2
  • L
GHSA-hq5f-3c8f-c5w8

<6.18.5-r2
  • L
GHSA-656v-jx98-63w5

<6.18.5-r2
  • M
NULL Pointer Dereference

<6.18.5-r2
  • M
CVE-2006-2932

<6.18.5-r2
  • L
GHSA-qc32-8fv3-qwvw

<6.18.5-r2
  • M
Race Condition

<6.18.5-r2
  • H
Out-of-bounds Read

<6.18.5-r2
  • H
Double Free

<6.18.5-r2
  • M
Memory Leak

<6.18.5-r2
  • M
CVE-2021-3714

<6.18.5-r2
  • M
Race Condition

<6.18.5-r2
  • L
GHSA-v927-32pv-88x8

<6.18.5-r2
  • L
GHSA-7xqj-7frw-hvvx

<6.18.5-r2
  • H
CVE-2023-39176

<6.18.5-r2
  • L
GHSA-j2cm-6mgm-v7v4

<6.18.5-r2
  • M
NULL Pointer Dereference

<6.18.5-r2
  • L
GHSA-7j7j-cjf4-3c2x

<6.18.5-r2
  • L
GHSA-x4rf-jx7j-r49m

<6.18.5-r2
  • L
GHSA-jq2w-p8gp-86fv

<6.18.5-r2
  • L
GHSA-gfpq-px23-jj9f

<6.18.5-r2
  • M
Out-of-bounds Read

<6.18.5-r2
  • L
GHSA-ff3j-qf4h-7gcp

<6.18.5-r2
  • L
GHSA-fgjc-j4q7-m9gg

<6.18.5-r2
  • L
Memory Leak

<6.18.5-r2
  • H
Out-of-bounds Read

<6.18.5-r2
  • L
GHSA-794c-rcrg-7j7w

<6.18.5-r2
  • M
Memory Leak

<6.18.5-r2
  • M
Resource Management Errors

<6.18.5-r2
  • L
GHSA-hgvm-qcpm-3g9q

<6.18.5-r2
  • L
GHSA-fj89-88c3-v65v

<6.18.5-r2
  • L
GHSA-jrcc-3vp8-hghg

<6.18.5-r2
  • L
GHSA-5qg4-5cpf-4r9p

<6.18.5-r2
  • L
GHSA-7fx7-755p-qmjj

<6.18.5-r2
  • L
GHSA-g854-mv2r-2r5h

<6.18.5-r2
  • L
GHSA-3chx-g7jg-4263

<6.18.5-r2
  • L
GHSA-7x98-4rw8-872g

<6.18.5-r2
  • L
GHSA-jq6r-jfg5-r4xg

<6.18.5-r2
  • L
GHSA-xfq3-69mc-84pr

<6.18.5-r2
  • M
Heap-based Buffer Overflow

<6.18.5-r2
  • M
Race Condition

<6.18.5-r2
  • L
GHSA-5gj8-wg34-rgv9

<6.18.5-r2
  • M
Use After Free

<6.18.5-r2
  • L
GHSA-6q37-hh76-6rv4

<6.18.5-r2
  • M
Time-of-check Time-of-use (TOCTOU)

<6.18.5-r2
  • L
GHSA-v8xr-j3gp-fmxj

<6.18.5-r2
  • H
Improper Access Control

<6.18.5-r2
  • L
Information Exposure

<6.18.5-r2