kernel-debug-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debug-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50099

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50142

<0:4.18.0-553.32.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.32.1.el8_10
  • M
Incorrect Default Permissions

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50192

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50256

<0:4.18.0-553.32.1.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50082

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-38564

<0:4.18.0-553.30.1.el8_10
  • M
Use After Free

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-27399

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-27043

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-40984

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38541

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2023-52492

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35839

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42292

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42244

<0:4.18.0-553.27.1.el8_10
  • M
Race Condition

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27062

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26976

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38540

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

<0:4.18.0-553.27.1.el8_10
  • M
Improper Initialization

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26851

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-39503

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-41042

<0:4.18.0-553.27.1.el8_10
  • M
Divide By Zero

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-46826

<0:4.18.0-553.27.1.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40983

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2022-48936

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38586

<0:4.18.0-553.27.1.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43880

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27017

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43892

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35898

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35939

<0:4.18.0-553.27.1.el8_10
  • M
Improper Validation of Array Index

<0:4.18.0-553.27.1.el8_10
  • H
CVE-2024-40988

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-37356

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40989

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42124

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41014

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42096

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47497

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41091

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52683

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26939

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48836

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-39499

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41064

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38559

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41035

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40978

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26665

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47289

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38579

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52478

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26846

<0:4.18.0-553.22.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36953

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36920

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26923

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26645

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40929

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47352

<0:4.18.0-553.22.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48760

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48754

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40998

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40931

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47466

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47287

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36883

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47097

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41090

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
Excessive Iteration

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41056

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41023

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40972

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36939

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41005

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41013

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-43830

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41008

<0:4.18.0-553.22.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41097

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52605

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40941

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47101

<0:4.18.0-553.22.1.el8_10
  • H
Integer Underflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47386

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42322

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40901

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52840

<0:4.18.0-553.22.1.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38558

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35877

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52800

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38619

<0:4.18.0-553.22.1.el8_10
  • H
Integer Overflow or Wraparound

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35944

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47383

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35809

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47393

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47455

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41041

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47441

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47384

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47385

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-39501

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47412

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52476

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40904

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41044

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41065

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26769

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47582

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36919

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47338

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47560

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48619

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52522

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26717

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52798

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26720

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47321

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36922

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35989

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41007

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26894

<0:4.18.0-553.22.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-27042

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35884

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26638

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26649

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42084

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42265

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26855

<0:4.18.0-553.22.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47527

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26880

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47432

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35930

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26870

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35910

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27434

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35876

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35900

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52648

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27388

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26960

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26669

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47461

<0:4.18.0-553.16.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35912

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27010

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52811

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26940

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35801

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36917

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26640

<0:4.18.0-553.16.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35893

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38575

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35790

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52784

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-2201

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52707

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26614

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36000

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52764

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36010

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35814

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-28746

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52775

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52662

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47018

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36929

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48757

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36017

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36006

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-40927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36945

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26802

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36960

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35897

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36933

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35952

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36954

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-31076

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35947

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35899

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52796

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36950

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27011

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35810

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47548

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-33621

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-39276

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-39502

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-40974

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26773

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38615

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36025

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38596

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26740

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26837

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47624

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26853

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26852

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52756

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48747

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52658

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52762

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52730

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26660

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-21823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36020

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26772

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36904

<0:4.18.0-553.16.1.el8_10
  • H
Improper Synchronization

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36016

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52679

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36905

<0:4.18.0-553.16.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52622

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47373

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36921

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38573

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35896

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47284

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27395

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35824

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47468

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47408

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36941

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26686

<0:4.18.0-553.16.1.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35847

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52777

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52803

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26878

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27065

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26843

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52791

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35937

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47304

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35807

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48632

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52847

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35946

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47257

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47579

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36889

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26698

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52486

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52619

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52864

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47491

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52845

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52623

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26840

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36940

<0:4.18.0-553.16.1.el8_10
  • H
Double Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26961

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36005

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52834

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27025

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36886

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26921

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35924

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52832

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26810

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26733

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26958

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35938

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36896

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26704

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52653

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36286

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35958

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26804

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35854

<0:4.18.0-553.8.1.el8_10
  • H
Incorrect Authorization

<0:4.18.0-553.8.1.el8_10
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-27410

<0:4.18.0-553.8.1.el8_10
  • H
Out-of-Bounds

<0:4.18.0-553.8.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35838

<0:4.18.0-553.8.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52781

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35890

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-36007

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47073

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26826

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26907

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35888

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-36004

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26675

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52669

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52700

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52626

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26801

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47353

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52878

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52686

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26906

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47495

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47456

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35855

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26656

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47310

<0:4.18.0-553.8.1.el8_10
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26982

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26974

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-27397

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52881

<0:4.18.0-553.8.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35959

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35835

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47069

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52675

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-46972

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35789

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26859

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35960

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26735

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47356

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52835

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47311

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26759

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47236

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52703

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52667

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35845

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52877

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52813

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35852

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35853

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-26897

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47185

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26743

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26964

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47055

<0:4.18.0-553.5.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-0340

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26973

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52598

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27048

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47153

<0:4.18.0-553.5.1.el8_10
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52607

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26642

<0:4.18.0-553.5.1.el8_10
  • M
Race Condition

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26872

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52606

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26693

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26892

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52610

<0:4.18.0-553.5.1.el8_10
  • M
Information Exposure

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-25744

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26779

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
Double Free

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2022-48627

<0:4.18.0-553.5.1.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2022-48669

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26694

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26659

<0:4.18.0-553.5.1.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26744

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26664

<0:4.18.0-553.5.1.el8_10
  • M
Improper Validation of Array Index

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26919

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26643

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52520

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27059

<0:4.18.0-553.5.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27056

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2021-47118

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26993

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27052

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2023-51779

<0:4.18.0-553.el8_10
  • M
Improper Initialization

<0:4.18.0-553.el8_10
  • M
Double Free

<0:4.18.0-553.el8_10
  • M
CVE-2024-26609

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
CVE-2023-52581

<0:4.18.0-553.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2023-24023

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Improper Synchronization

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2023-52340

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2024-26602

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2023-25775

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • M
CVE-2023-52489

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2024-26671

<0:4.18.0-553.el8_10
  • M
CVE-2023-52580

<0:4.18.0-553.el8_10
  • M
CVE-2023-38409

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2024-25743

<0:4.18.0-553.el8_10
  • M
CVE-2023-52620

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
CVE-2024-25742

<0:4.18.0-553.el8_10
  • M
Race Condition

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • H
Integer Overflow or Wraparound

<0:4.18.0-513.24.1.el8_9
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.24.1.el8_9
  • H
Integer Underflow

<0:4.18.0-513.24.1.el8_9
  • H
Race Condition

<0:4.18.0-513.24.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.24.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.0.1.el8_9
  • H
CVE-2023-46813

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.0.2.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-Bounds

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Use After Free

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.18.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.11.0.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.0.1.el8_9
  • H
Use After Free

<0:4.18.0-513.11.0.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Incorrect Calculation

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Incorrect Calculation

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-35825

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-30456

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
CVE-2023-31084

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Resource Exhaustion

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Read

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Improper Resource Shutdown or Release

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-Bounds

<0:4.18.0-513.5.1.el8_9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-513.5.1.el8_9
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Access of Uninitialized Pointer

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.18.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Race Condition

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Double Free

<0:4.18.0-513.5.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Memory Leak

<0:4.18.0-513.5.1.el8_9
  • H
Buffer Overflow

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-513.5.1.el8_9
  • H
Information Exposure

<0:4.18.0-513.5.1.el8_9
  • H
Use After Free

<0:4.18.0-477.27.0.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.0.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.0.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.0.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.0.1.el8_8
  • H
CVE-2023-20593

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Incorrect Authorization

<0:4.18.0-477.27.0.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.15.1.el8_8
  • H
Use After Free

<0:4.18.0-477.13.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Improper Control of Dynamically-Managed Code Resources

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
CVE-2022-39189

<0:4.18.0-477.10.1.el8_8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-477.10.1.el8_8
  • H
Memory Leak

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-Bounds

<0:4.18.0-477.10.1.el8_8
  • H
Double Free

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
CVE-2023-0386

<0:4.18.0-425.19.2.el8_7
  • H
Insecure Default Initialization of Resource

<0:4.18.0-477.10.1.el8_8
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Improper Locking

<0:4.18.0-477.10.1.el8_8
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
NULL Pointer Dereference

<0:4.18.0-477.10.1.el8_8
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Buffer Overflow

<0:4.18.0-477.10.1.el8_8
  • H
Improper Resource Shutdown or Release

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • H
Memory Leak

<0:4.18.0-425.10.1.el8_7
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-425.19.2.el8_7
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:4.18.0-477.10.1.el8_8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • M
CVE-2022-29581

<0:4.18.0-425.3.1.el8
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-20368

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Missing Authorization

<0:4.18.0-477.10.1.el8_8
  • M
CVE-2022-26373

<0:4.18.0-425.3.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-477.10.1.el8_8
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.0.1.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.32.1.0.1.el8_6
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • H
Race Condition

<0:4.18.0-477.10.1.el8_8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • M
Stack-based Buffer Overflow

<0:4.18.0-425.3.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-477.10.1.el8_8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.0.1.el8_6
  • H
Double Free

<0:4.18.0-372.32.1.0.1.el8_6
  • H
Use After Free

<0:4.18.0-372.19.1.0.1.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.32.1.0.1.el8_6
  • H
CVE-2022-23816

<0:4.18.0-372.32.1.0.1.el8_6
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.19.1.0.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.0.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.0.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.0.1.el8_6
  • H
CVE-2022-1353

<0:4.18.0-372.32.1.0.1.el8_6
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.9.1.0.2.el8
  • H
Race Condition

<0:4.18.0-372.16.1.0.1.el8_6
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-3773

<0:4.18.0-372.9.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-43056

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
Improper Privilege Management

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-43976

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • H
Incorrect Type Conversion or Cast

<0:4.18.0-372.9.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.13.1.0.1.el8_6
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
Improper Handling of Exceptional Conditions

<0:4.18.0-425.3.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-425.3.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • H
Improper Privilege Management

<0:4.18.0-348.23.1.el8_5
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-477.10.1.el8_8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Improper Initialization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
CVE-2022-0516

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Race Condition

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-372.9.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
Double Free

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.9.1.el8
  • H
CVE-2020-4788

<0:4.18.0-372.9.1.el8
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • H
Improper Validation of Specified Quantity in Input

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • M
Use After Free

<0:4.18.0-348.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
NULL Pointer Dereference

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Handling of Exceptional Conditions

<0:4.18.0-348.el8
  • M
Incorrect Authorization

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Buffer Overflow

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
CVE-2020-24503

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Double Free

<0:4.18.0-348.el8
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Resource Exhaustion

<0:4.18.0-348.el8
  • M
CVE-2021-3732

<0:4.18.0-348.el8
  • M
CVE-2021-0129

<0:4.18.0-348.el8
  • M
Out-of-Bounds

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-348.el8
  • M
CVE-2021-29646

<0:4.18.0-348.el8
  • M
CVE-2020-24586

<0:4.18.0-348.el8
  • M
CVE-2020-26147

<0:4.18.0-348.el8
  • M
Improper Authentication

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Improper Validation of Integrity Check Value

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Race Condition

<0:4.18.0-348.el8
  • M
Out-of-bounds Write

<0:4.18.0-348.el8
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • M
Improper Input Validation

<0:4.18.0-348.el8
  • M
Excessive Iteration

<0:4.18.0-348.el8
  • M
Incorrect Calculation

<0:4.18.0-348.el8
  • H
Out-of-bounds Write

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-305.17.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.17.1.el8_4
  • H
Arbitrary Command Injection

<0:4.18.0-372.9.1.el8
  • M
Missing Authorization

<0:4.18.0-348.el8
  • M
CVE-2021-29650

<0:4.18.0-348.el8
  • H
Out-of-Bounds

<0:4.18.0-305.12.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Out-of-bounds Write

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Improper Initialization

<0:4.18.0-305.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
Incomplete Cleanup

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Use After Free

<0:4.18.0-240.22.1.el8_3
  • H
Improper Locking

<0:4.18.0-240.22.1.el8_3
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.22.1.el8_3
  • H
Out-of-bounds Write

<0:4.18.0-240.22.1.el8_3
  • H
CVE-2021-27363

<0:4.18.0-240.22.1.el8_3
  • H
Out-of-bounds Read

<0:4.18.0-240.22.1.el8_3
  • H
Directory Traversal

<0:4.18.0-240.22.1.el8_3
  • M
Out-of-bounds Read

<0:4.18.0-348.el8
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.0.1.el8_6
  • H
Use of Insufficiently Random Values

<0:4.18.0-240.15.1.el8_3
  • H
Use After Free

<0:4.18.0-240.15.1.el8_3
  • H
Memory Leak

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • H
Buffer Overflow

<0:4.18.0-240.10.1.el8_3
  • H
CVE-2020-26541

<0:4.18.0-305.7.1.el8_4
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
Incorrect Authorization

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Race Condition

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • H
NULL Pointer Dereference

<0:4.18.0-305.el8
  • H
Out-of-bounds Read

<0:4.18.0-305.el8
  • M
Use of Insufficiently Random Values

<0:4.18.0-240.8.1.el8_3
  • H
Improper Input Validation

<0:4.18.0-305.el8
  • H
Incorrect Permission Assignment for Critical Resource

<0:4.18.0-305.el8
  • H
Time-of-check Time-of-use (TOCTOU)

<0:4.18.0-305.el8
  • H
CVE-2020-24490

<0:4.18.0-240.1.1.el8_3
  • H
Improper Access Control

<0:4.18.0-240.1.1.el8_3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.0-240.1.1.el8_3
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Buffer Access with Incorrect Length Value

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Out-of-bounds Read

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Out-of-Bounds

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
CVE-2020-10773

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-240.el8
  • M
Buffer Overflow

<0:4.18.0-240.el8
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.28.1.el8_2
  • H
Missing Initialization of Resource

<0:4.18.0-193.28.1.el8_2
  • H
Improper Input Validation

<0:4.18.0-193.28.1.el8_2
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-193.28.1.el8_2
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Integer Overflow or Wraparound

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • H
Use After Free

<0:4.18.0-305.el8
  • M
CVE-2020-12770

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
Out-of-bounds Write

<0:4.18.0-240.el8
  • M
NULL Pointer Dereference

<0:4.18.0-240.el8
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Missing Authorization

<0:4.18.0-193.14.3.el8_2
  • M
CVE-2019-20908

<0:4.18.0-193.14.3.el8_2
  • H
Out-of-Bounds

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.13.2.el8_2
  • H
CVE-2020-10766

<0:4.18.0-193.13.2.el8_2
  • H
CVE-2020-10767

<0:4.18.0-193.13.2.el8_2
  • H
CVE-2020-10768

<0:4.18.0-193.13.2.el8_2
  • H
Use After Free

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.13.2.el8_2
  • H
Out-of-bounds Write

<0:4.18.0-193.13.2.el8_2
  • H
Information Exposure

<0:4.18.0-193.1.2.el8_2
  • H
Use After Free

<0:4.18.0-193.6.3.el8_2
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-193.13.2.el8_2
  • H
Race Condition

<0:4.18.0-193.1.2.el8_2
  • H
NULL Pointer Dereference

<0:4.18.0-193.1.2.el8_2
  • H
Use After Free

<0:4.18.0-193.el8
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-193.el8
  • H
Resource Exhaustion

<0:4.18.0-193.el8
  • H
Memory Leak

<0:4.18.0-193.el8
  • H
Memory Leak

<0:4.18.0-193.el8
  • H
Missing Initialization of Resource

<0:4.18.0-193.el8
  • H
Memory Leak

<0:4.18.0-193.el8
  • H
Out-of-bounds Read

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-193.el8
  • M
Missing Release of Resource after Effective Lifetime

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Use of Uninitialized Resource

<0:4.18.0-240.el8
  • M
Race Condition

<0:4.18.0-240.el8
  • M
Use After Free

<0:4.18.0-240.el8
  • M
Release of Invalid Pointer or Reference

<0:4.18.0-240.el8
  • M
Information Exposure

<0:4.18.0-240.el8
  • M
Memory Leak

<0:4.18.0-240.el8
  • M
Improper Synchronization

<0:4.18.0-147.8.1.el8_1
  • M
Missing Authorization

<0:4.18.0-147.8.1.el8_1
  • M
Use After Free

<0:4.18.0-147.8.1.el8_1
  • M
Information Exposure

<0:4.18.0-147.8.1.el8_1
  • H
Inadequate Encryption Strength

<0:4.18.0-193.el8
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Race Condition

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Information Exposure

<0:4.18.0-147.5.1.el8_1
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.5.1.el8_1
  • H
Incorrect Default Permissions

<0:4.18.0-193.el8
  • H
Missing Authorization

<0:4.18.0-193.el8
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Memory Leak

<0:4.18.0-193.el8
  • H
CVE-2019-0155

<0:4.18.0-147.0.3.el8_1
  • H
CVE-2019-0154

<0:4.18.0-147.0.2.el8_1
  • H
Improper Input Validation

<0:4.18.0-147.0.2.el8_1
  • H
CVE-2019-11135

<0:4.18.0-147.0.2.el8_1
  • H
NULL Pointer Dereference

<0:4.18.0-147.el8
  • H
CVE-2019-11884

<0:4.18.0-147.el8
  • H
Information Exposure

<0:4.18.0-147.el8
  • H
Out-of-bounds Write

<0:4.18.0-147.el8
  • H
Inadequate Encryption Strength

<0:4.18.0-147.el8
  • H
Race Condition

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Resource Exhaustion

<0:4.18.0-147.el8
  • H
Memory Leak

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-147.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-147.el8
  • H
Buffer Overflow

<0:4.18.0-80.11.2.el8_0
  • H
Improper Input Validation

<0:4.18.0-80.11.1.el8_0
  • H
Incorrect Authorization

<0:4.18.0-80.11.1.el8_0
  • H
Heap-based Buffer Overflow

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-bounds Write

<0:4.18.0-80.11.1.el8_0
  • H
Out-of-bounds Write

<0:4.18.0-80.11.1.el8_0
  • H
Use After Free

<0:4.18.0-80.11.1.el8_0
  • H
CVE-2019-13272

<0:4.18.0-80.7.2.el8_0
  • H
CVE-2019-1125

<0:4.18.0-80.7.2.el8_0
  • H
Cleartext Transmission of Sensitive Information

<0:4.18.0-147.el8
  • H
Improper Locking

<0:4.18.0-147.el8
  • H
CVE-2019-7222

<0:4.18.0-147.el8
  • H
Out-of-bounds Read

<0:4.18.0-147.el8
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-147.el8
  • H
Improper Input Validation

<0:4.18.0-147.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-147.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-147.el8
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-80.7.1.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-193.el8
  • H
Improper Input Validation

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-80.7.1.el8_0
  • H
Use After Free

<0:4.18.0-147.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-80.4.2.el8_0
  • H
NULL Pointer Dereference

<0:4.18.0-80.4.2.el8_0
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-80.4.2.el8_0
  • H
Resource Exhaustion

<0:4.18.0-80.4.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
CVE-2019-11091

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Information Exposure

<0:4.18.0-80.1.2.el8_0
  • H
Access Restriction Bypass

<0:4.18.0-147.el8