kernel-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Write-what-where Condition

<0:6.12.0-55.29.1.el10_0
  • M
Integer Underflow

<0:6.12.0-55.29.1.el10_0
  • M
Missing Report of Error Condition

<0:6.12.0-55.29.1.el10_0
  • H
Use of Uninitialized Resource

<0:6.12.0-55.28.1.el10_0
  • M
Incorrect Type Conversion or Cast

<0:6.12.0-55.28.1.el10_0
  • M
Race Condition

<0:6.12.0-55.28.1.el10_0
  • M
Use After Free

<0:6.12.0-55.28.1.el10_0
  • H
Use After Free

<0:6.12.0-55.28.1.el10_0
  • M
Double Free

<0:6.12.0-55.27.1.el10_0
  • M
Use After Free

<0:6.12.0-55.27.1.el10_0
  • M
Out-of-Bounds

<0:6.12.0-55.27.1.el10_0
  • M
Information Exposure

<0:6.12.0-55.27.1.el10_0
  • M
Out-of-Bounds

<0:6.12.0-55.27.1.el10_0
  • M
Use After Free

<0:6.12.0-55.27.1.el10_0
  • M
Information Exposure

<0:6.12.0-55.27.1.el10_0
  • M
Use of Uninitialized Resource

<0:6.12.0-55.25.1.el10_0
  • M
Use After Free

<0:6.12.0-55.25.1.el10_0
  • M
Use After Free

<0:6.12.0-55.25.1.el10_0
  • M
Use After Free

<0:6.12.0-55.25.1.el10_0
  • M
Use After Free

<0:6.12.0-55.25.1.el10_0
  • M
Use After Free

<0:6.12.0-55.25.1.el10_0
  • M
Missing Synchronization

<0:6.12.0-55.25.1.el10_0
  • M
Resource Injection

<0:6.12.0-55.25.1.el10_0
  • H
Operation on a Resource after Expiration or Release

<0:6.12.0-55.25.1.el10_0
  • H
Use After Free

<0:6.12.0-55.25.1.el10_0
  • H
Use After Free

<0:6.12.0-55.25.1.el10_0
  • M
CVE-2025-38234

<0:6.12.0-55.18.1.el10_0
  • M
Improper Validation of Specified Quantity in Input

<0:6.12.0-55.24.1.el10_0
  • M
Out-of-bounds Read

<0:6.12.0-55.24.1.el10_0
  • M
CVE-2025-22091

<0:6.12.0-55.24.1.el10_0
  • M
Use After Free

<0:6.12.0-55.24.1.el10_0
  • M
CVE-2025-38088

<0:6.12.0-55.24.1.el10_0
  • H
Improper Check for Unusual or Exceptional Conditions

<0:6.12.0-55.22.1.el10_0
  • M
Use After Free

<0:6.12.0-55.22.1.el10_0
  • M
Out-of-bounds Read

<0:6.12.0-55.22.1.el10_0
  • M
Use After Free

<0:6.12.0-55.22.1.el10_0
  • M
Double Free

<0:6.12.0-55.22.1.el10_0
  • M
Use After Free

<0:6.12.0-55.21.1.el10_0
  • M
Use After Free

<0:6.12.0-55.20.1.el10_0
  • H
Information Exposure

<0:6.12.0-55.20.1.el10_0
  • M
Out-of-bounds Write

<0:6.12.0-55.20.1.el10_0
  • M
Use After Free

<0:6.12.0-55.19.1.el10_0
  • M
Improper Initialization

<0:6.12.0-55.19.1.el10_0
  • M
Buffer Overflow

<0:6.12.0-55.19.1.el10_0
  • M
Use After Free

<0:6.12.0-55.18.1.el10_0
  • M
Use After Free

<0:6.12.0-55.18.1.el10_0
  • M
Use After Free

<0:6.12.0-55.18.1.el10_0
  • M
Use After Free

<0:6.12.0-55.17.1.el10_0
  • H
Use After Free

<0:6.12.0-55.17.1.el10_0
  • M
Use After Free

<0:6.12.0-55.17.1.el10_0
  • M
Use After Free

<0:6.12.0-55.17.1.el10_0
  • M
Integer Overflow or Wraparound

<0:6.12.0-55.17.1.el10_0
  • M
Integer Overflow or Wraparound

<0:6.12.0-55.17.1.el10_0
  • M
Use After Free

<0:6.12.0-55.17.1.el10_0
  • M
Use After Free

<0:6.12.0-55.17.1.el10_0
  • M
NULL Pointer Dereference

<0:6.12.0-55.16.1.el10_0
  • M
Integer Overflow or Wraparound

<0:6.12.0-55.16.1.el10_0
  • H
Incorrect Check of Function Return Value

<0:6.12.0-55.16.1.el10_0
  • M
Use After Free

<0:6.12.0-55.16.1.el10_0
  • M
Out-of-bounds Read

<0:6.12.0-55.16.1.el10_0
  • M
Out-of-bounds Write

<0:6.12.0-55.14.1.el10_0
  • M
Out-of-bounds Read

<0:6.12.0-55.14.1.el10_0
  • M
Integer Overflow or Wraparound

<0:6.12.0-55.14.1.el10_0
  • H
Out-of-bounds Write

<0:6.12.0-55.13.1.el10_0
  • H
Use After Free

<0:6.12.0-55.13.1.el10_0
  • M
Out-of-bounds Read

<0:6.12.0-55.12.1.el10_0
  • M
Out-of-Bounds

<0:6.12.0-55.12.1.el10_0
  • H
Out-of-Bounds

<0:6.12.0-55.11.1.el10_0
  • H
Information Exposure

<0:2.6.18-430.el5
  • H
Race Condition

<0:2.6.18-238.57.1.el5
  • M
NULL Pointer Dereference

<0:2.4.21-66.EL
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • H
Numeric Errors

<0:2.4.21-66.EL
  • H
Out-of-Bounds

<0:2.6.18-420.el5
  • H
Out-of-Bounds

<0:2.6.18-423.el5
  • L
CVE-2017-1000379

<0:2.6.18-420.el5
  • H
Out-of-bounds Read

<0:2.6.18-422.el5
  • H
Use After Free

<0:2.6.18-238.58.1.el5
  • M
NULL Pointer Dereference

<0:2.6.18-238.58.1.el5
  • H
Heap-based Buffer Overflow

<0:2.6.18-438.el5
  • M
Divide By Zero

<0:2.6.18-433.el5
  • M
Use After Free

<0:2.6.18-436.el5
  • H
Use After Free

<0:2.6.18-436.el5
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • M
Use After Free

<0:2.6.18-436.el5
  • M
Execution with Unnecessary Privileges

<0:2.6.18-431.el5
  • H
Information Exposure

<0:2.6.18-434.el5
  • H
Information Exposure

<0:2.6.18-433.el5
  • H
Information Exposure

<0:2.6.18-434.el5
  • H
Information Exposure

<0:2.6.18-426.el5
  • H
Information Exposure

<0:2.6.18-426.el5
  • H
Information Exposure

<0:2.6.18-439.el5
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • H
Information Exposure

<0:2.6.18-238.53.1.el5
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.18-238.53.1.el5
  • H
Improper Enforcement of Behavioral Workflow

<0:2.6.18-238.54.1.el5
  • H
Improper Enforcement of Behavioral Workflow

<0:2.6.9-106.EL
  • H
Code

<0:2.6.18-238.56.1.el5
  • M
Numeric Errors

<0:2.6.18-128.36.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.18-238.55.1.el5