libcacard-rhev vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libcacard-rhev package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • H
Heap-based Buffer Overflow

<10:2.1.2-23.el7_1.9
  • L
Incomplete Blacklist

*
  • L
Incomplete Blacklist

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • H
Heap-based Buffer Overflow

*
  • H
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • H
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Buffer Overflow

<10:2.3.0-31.el7_2.21
  • M
Buffer Overflow

<10:2.3.0-31.el7_2.21
  • M
Buffer Overflow

<10:2.3.0-31.el7_2.21
  • M
Resource Exhaustion

<10:2.3.0-31.el7_2.21
  • M
Resource Exhaustion

<10:2.3.0-31.el7_2.21
  • M
Resource Exhaustion

<10:2.3.0-31.el7_2.21
  • H
Out-of-Bounds

<10:2.3.0-31.el7_2.13
  • H
Out-of-Bounds

<10:2.3.0-31.el7_2.13
  • H
Out-of-Bounds

*
  • H
Out-of-bounds Read

*
  • H
Out-of-bounds Read

<10:2.3.0-31.el7_2.7
  • M
Missing Initialization of a Variable

<10:2.1.2-23.el7_1.8
  • H
Sensitive Information Uncleared Before Release

*
  • L
Heap-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • M
Stack-based Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • H
Heap-based Buffer Overflow

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Reachable Assertion

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Insufficient Entropy

*
  • L
Insufficient Entropy

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Use After Free

<10:2.3.0-31.el7_2.7
  • H
Use After Free

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Divide By Zero

*
  • L
Stack-based Buffer Overflow

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Improper Access Control

*