java-21-openjdk-devel-fastdebug

Direct Vulnerabilities

Known vulnerabilities in the java-21-openjdk-devel-fastdebug package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Cleartext Transmission of Sensitive Information

*
  • L
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Uncontrolled Recursion

*
  • L
Out-of-bounds Read

*
  • H
XML External Entity (XXE) Injection

*
  • M
Integer Overflow or Wraparound

*
  • M
Expired Pointer Dereference

*
  • M
Expired Pointer Dereference

*
  • M
Buffer Underflow

*
  • H
Out-of-bounds Write

*
  • M
Incorrect Calculation of Buffer Size

*
  • H
Out-of-bounds Read

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
CVE-2026-23865

*
  • M
Buffer Overflow

*
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • H
Improper Certificate Validation

<1:21.0.10.0.7-1.el9
  • H
CRLF Injection

<1:21.0.10.0.7-1.el9
  • H
Key Exchange without Entity Authentication

<1:21.0.10.0.7-1.el9
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Buffer Overflow

*
  • H
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Write

<1:21.0.10.0.7-1.el9
  • H
Out-of-bounds Read

<1:21.0.10.0.7-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
CVE-2025-53066

<1:21.0.9.0.10-1.el9
  • M
Object Model Violation: Just One of Equals and Hashcode Defined

<1:21.0.9.0.10-1.el9
  • M
Inappropriate Encoding for Output Context

<1:21.0.9.0.10-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Out-of-bounds Write

<1:21.0.3.0.9-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Out-of-bounds Write

<1:21.0.3.0.9-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • M
Out-of-bounds Write

<1:21.0.3.0.9-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • M
Out-of-bounds Write

<1:21.0.3.0.9-1.el9
  • M
Out-of-bounds Write

<1:21.0.3.0.9-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Out-of-bounds Write

<1:21.0.3.0.9-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Out-of-bounds Write

<1:21.0.3.0.9-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Information Exposure

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • H
Missing Required Cryptographic Step

<1:21.0.8.0.9-1.el9
  • H
Heap-based Buffer Overflow

<1:21.0.8.0.9-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • M
Heap-based Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Buffer Overflow

<1:21.0.7.0.6-1.el9
  • M
Information Exposure

<1:21.0.7.0.6-1.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.6.0.7-1.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Signed to Unsigned Conversion Error

<1:21.0.5.0.10-3.el9
  • M
Uncontrolled Memory Allocation

<1:21.0.5.0.10-3.el9
  • M
Integer Overflow or Wraparound

<1:21.0.5.0.10-3.el9
  • M
Improper Handling of Length Parameter Inconsistency

<1:21.0.5.0.10-3.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9
  • H
CVE-2024-21147

<1:21.0.4.0.7-1.el9
  • H
Out-of-bounds Write

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21140

<1:21.0.4.0.7-1.el9
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:21.0.4.0.7-1.el9
  • H
CVE-2024-21131

<1:21.0.4.0.7-1.el9
  • M
Improper Output Neutralization for Logs

<1:21.0.3.0.9-1.el9
  • M
Integer Overflow or Wraparound

<1:21.0.3.0.9-1.el9
  • M
Reliance on Reverse DNS Resolution for a Security-Critical Action

<1:21.0.3.0.9-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Improper Input Validation

<1:21.0.2.0.13-1.el9
  • H
Information Exposure Through Log Files

<1:21.0.2.0.13-1.el9
  • H
Covert Timing Channel

<1:21.0.2.0.13-1.el9
  • H
Out-of-bounds Write

<1:21.0.2.0.13-1.el9
  • M
Out-of-Bounds

<1:21.0.5.0.10-3.el9
  • M
Improper Certificate Validation

<1:21.0.1.0.12-2.el9
  • M
Out-of-Bounds

<1:21.0.1.0.12-2.el9