Race Condition | |
Resource Injection | |
Out-of-bounds Read | |
Out-of-Bounds | |
Race Condition | |
CVE-2024-53119 | |
CVE-2024-53117 | |
CVE-2024-53109 | |
CVE-2024-53118 | |
CVE-2024-53114 | |
CVE-2024-53105 | |
CVE-2024-53113 | |
CVE-2024-53121 | |
CVE-2024-53110 | |
CVE-2024-53120 | |
CVE-2024-53124 | |
CVE-2024-53123 | |
CVE-2024-53122 | |
CVE-2023-52922 | |
Information Exposure | |
NULL Pointer Dereference | |
Improper Check for Unusual or Exceptional Conditions | |
Race Condition | |
CVE-2024-53073 | |
NULL Pointer Dereference | |
CVE-2024-53042 | |
Buffer Overflow | |
CVE-2024-50256 | |
CVE-2024-50251 | |
Out-of-bounds Write | |
CVE-2024-53072 | |
CVE-2024-50275 | |
CVE-2024-53095 | |
CVE-2024-50185 | |
Out-of-bounds Read | |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
CVE-2024-50201 | |
Improper Initialization | |
Race Condition | |
CVE-2024-53044 | |
Double Free | |
CVE-2024-50191 | |
Use of Uninitialized Resource | |
Double Free | |
CVE-2024-53048 | |
CVE-2024-53059 | |
Improper Locking | |
Improper Locking | |
CVE-2024-53091 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | |
Integer Underflow | |
CVE-2024-50186 | |
CVE-2024-50216 | |
CVE-2024-50179 | |
CVE-2024-53070 | |
Use of Uninitialized Resource | |
Improper Locking | |
Double Free | |
Improper Locking | |
CVE-2024-53093 | |
NULL Pointer Dereference | |
CVE-2024-50303 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Locking | |
CVE-2024-50294 | |
NULL Pointer Dereference | |
CVE-2024-50200 | |
CVE-2024-50209 | |
CVE-2024-50183 | |
Out-of-Bounds | |
Memory Leak | |
Expired Pointer Dereference | |
Use of Uninitialized Resource | |
Improper Locking | |
Improper Locking | |
CVE-2024-53090 | |
Resource Injection | |
CVE-2024-50192 | |
Out-of-bounds Read | |
Use After Free | |
CVE-2024-50304 | |
Out-of-bounds Read | |
Always-Incorrect Control Flow Implementation | |
Out-of-bounds Read | |
Use After Free | |
Missing Release of Resource after Effective Lifetime | |
CVE-2024-53051 | |
CVE-2024-50194 | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Memory Leak | |
CVE-2024-50182 | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
CVE-2024-50219 | |
CVE-2024-53045 | |
CVE-2024-53094 | |
Memory Leak | |
CVE-2024-50211 | |
CVE-2024-50189 | |
Use After Free | |
CVE-2024-50199 | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Heap-based Buffer Overflow | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Resource Exhaustion | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Resource Leak | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Handling of Values | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Heap-based Buffer Overflow | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Resource Exhaustion | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Resource Leak | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Handling of Values | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Heap-based Buffer Overflow | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Resource Exhaustion | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Resource Leak | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Handling of Values | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Use After Free | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
Improper Input Validation | <0:5.14.0-284.92.1.rt14.377.el9_2 |
CVE-2024-50157 | |
CVE-2024-50107 | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
CVE-2024-50148 | |
Use After Free | |
CVE-2024-50142 | |
Out-of-bounds Write | |
CVE-2024-50164 | |
Memory Leak | |
Use of Uninitialized Resource | |
CVE-2024-50163 | |
Use After Free | |
CVE-2024-50155 | |
NULL Pointer Dereference | |
Use After Free | |
Use of Uninitialized Resource | |
CVE-2024-50136 | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
CVE-2024-50138 | |
CVE-2024-50095 | |
CVE-2024-50093 | |
CVE-2024-50099 | |
CVE-2024-50101 | |
Buffer Overflow | |
Out-of-bounds Read | |
Use After Free | |
Information Exposure | |
Memory Leak | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-50120 | |
Memory Leak | |
NULL Pointer Dereference | |
CVE-2024-50162 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-50139 | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Excessive Platform Resource Consumption within a Loop | |
NULL Pointer Dereference | |
Missing Initialization of Resource | |
CVE-2024-50082 | |
Out-of-bounds Write | |
Use After Free | |
CVE-2024-50077 | |
CVE-2024-50075 | |
CVE-2024-50081 | |
CVE-2024-50083 | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Resource Shutdown or Release | <0:5.14.0-284.90.1.rt14.375.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Use After Free | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2024-40998 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Initialization | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Input Validation | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Resource Locking | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Race Condition | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2024-2201 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Race Condition | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Use After Free | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2021-47384 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Resource Shutdown or Release | <0:5.14.0-284.90.1.rt14.375.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Use After Free | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2024-40998 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Initialization | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Input Validation | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Resource Locking | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Race Condition | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2024-2201 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Race Condition | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Use After Free | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2021-47384 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Resource Shutdown or Release | <0:5.14.0-284.90.1.rt14.375.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Use After Free | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2024-40998 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Initialization | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Input Validation | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Improper Resource Locking | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Race Condition | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2024-2201 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Race Condition | <0:5.14.0-284.90.1.rt14.375.el9_2 |
Use After Free | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2021-47384 | <0:5.14.0-284.90.1.rt14.375.el9_2 |
CVE-2024-49971 | |
CVE-2024-50060 | |
Use After Free | |
CVE-2024-49995 | |
Memory Leak | |
CVE-2024-50019 | |
CVE-2024-49968 | |
CVE-2024-50038 | |
CVE-2024-50010 | |
Operation on a Resource after Expiration or Release | |
CVE-2024-50021 | |
CVE-2024-49940 | |
Improper Locking | |
CVE-2024-50015 | |
CVE-2024-49886 | |
Release of Invalid Pointer or Reference | |
Access of Uninitialized Pointer | |
CVE-2024-49885 | |
CVE-2024-50028 | |
CVE-2024-49946 | |
NULL Pointer Dereference | |
CVE-2024-47738 | |
Use of Uninitialized Resource | |
Improper Locking | |
CVE-2024-50022 | |
CVE-2024-47715 | |
Improper Resource Shutdown or Release | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Locking | |
Use After Free | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Double Free | |
Race Condition | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Double Free | |
CVE-2024-49948 | |
Use After Free | |
Use After Free | |
CVE-2024-50063 | |
CVE-2024-50012 | |
Memory Leak | |
NULL Pointer Dereference | |
Divide By Zero | |
Memory Leak | |
Improper Access Control | |
Incomplete Cleanup | |
CVE-2024-50023 | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Always-Incorrect Control Flow Implementation | |
Use After Free | |
NULL Pointer Dereference | |
Double Free | |
CVE-2024-50020 | |
Improper Handling of Exceptional Conditions | |
Information Exposure | |
Improper Validation of Array Index | |
CVE-2024-49974 | |
NULL Pointer Dereference | |
CVE-2024-49959 | |
CVE-2024-49878 | |
CVE-2024-49954 | |
Memory Leak | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Improper Locking | |
Improper Control of a Resource Through its Lifetime | |
NULL Pointer Dereference | |
CVE-2024-49934 | |
Improper Validation of Integrity Check Value | |
CVE-2024-49933 | |
Integer Overflow or Wraparound | |
Improper Validation of Array Index | |
CVE-2024-49861 | |
Improper Check for Unusual or Exceptional Conditions | |
Memory Leak | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
CVE-2024-50040 | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-49937 | |
Use After Free | |
Race Condition | |
NULL Pointer Dereference | |
CVE-2024-47710 | |
NULL Pointer Dereference | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
CVE-2024-49999 | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
CVE-2024-47703 | |
Use After Free | |
Race Condition | |
Off-by-one Error | |
Off-by-one Error | |
Use After Free | |
CVE-2024-50008 | |
CVE-2024-49935 | |
Memory Leak | |
NULL Pointer Dereference | |
CVE-2024-49927 | |
Operation on a Resource after Expiration or Release | |
Use After Free | |
Improper Input Validation | |
Divide By Zero | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2024-49944 | |
Use After Free | |
CVE-2024-47713 | |
CVE-2024-49967 | |
Off-by-one Error | |
Use of Uninitialized Resource | |
Integer Overflow or Wraparound | |
Incomplete Cleanup | |
CVE-2023-52917 | |
Use After Free | |
Use After Free | |
Use After Free | |
Memory Leak | |
CVE-2022-48994 | |
Improper Validation of Array Index | |
Memory Leak | |
Resource Injection | |
CVE-2022-48978 | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
Incomplete Cleanup | |
Memory Leak | |
Incomplete Cleanup | |
Use After Free | |
Use After Free | |
Incomplete Cleanup | |
Memory Leak | |
CVE-2022-48986 | |
Integer Overflow or Wraparound | |
Use After Free | |
Use After Free | |
CVE-2022-48961 | |
Missing Release of Resource after Effective Lifetime | |
Improper Control of a Resource Through its Lifetime | |
Out-of-bounds Read | |
Use After Free | |
Memory Leak | |
Race Condition | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-Bounds | |
Race Condition | |
Integer Overflow or Wraparound | |
Memory Leak | |
CVE-2022-49027 | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
NULL Pointer Dereference | |
Resource Exhaustion | |
Improper Input Validation | |
Return of Wrong Status Code | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Use of Uninitialized Resource | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Deadlock | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Information Exposure | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Out-of-Bounds | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Improper Input Validation | <0:5.14.0-284.88.1.rt14.373.el9_2 |
CVE-2023-28746 | <0:5.14.0-284.88.1.rt14.373.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Return of Wrong Status Code | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Use of Uninitialized Resource | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Deadlock | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Information Exposure | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Out-of-Bounds | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Improper Input Validation | <0:5.14.0-284.88.1.rt14.373.el9_2 |
CVE-2023-28746 | <0:5.14.0-284.88.1.rt14.373.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Return of Wrong Status Code | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Use of Uninitialized Resource | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Deadlock | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Information Exposure | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Out-of-Bounds | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Improper Input Validation | <0:5.14.0-284.88.1.rt14.373.el9_2 |
CVE-2023-28746 | <0:5.14.0-284.88.1.rt14.373.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.88.1.rt14.373.el9_2 |
Improper Check for Unusual or Exceptional Conditions | |
Race Condition | |
Race Condition | |
Information Exposure | |
Improper Validation of Array Index | |
CVE-2024-47673 | |
CVE-2022-48695 | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
CVE-2022-48695 | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
CVE-2022-48695 | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
CVE-2022-48695 | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Initialization | <0:5.14.0-284.86.1.rt14.371.el9_2 |
Use After Free | <0:5.14.0-284.86.1.rt14.371.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.86.1.rt14.371.el9_2 |
CVE-2024-27415 | <0:5.14.0-284.86.1.rt14.371.el9_2 |
Improper Initialization | <0:5.14.0-284.86.1.rt14.371.el9_2 |
Use After Free | <0:5.14.0-284.86.1.rt14.371.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.86.1.rt14.371.el9_2 |
CVE-2024-27415 | <0:5.14.0-284.86.1.rt14.371.el9_2 |
CVE-2024-27052 | |
Out-of-bounds Read | |
Improper Initialization | <0:5.14.0-284.86.1.rt14.371.el9_2 |
Use After Free | <0:5.14.0-284.86.1.rt14.371.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.86.1.rt14.371.el9_2 |
CVE-2024-27415 | <0:5.14.0-284.86.1.rt14.371.el9_2 |
CVE-2024-46839 | |
Divide By Zero | |
Unchecked Input for Loop Condition | |
NULL Pointer Dereference | |
CVE-2024-46830 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-46855 | |
Use After Free | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-46825 | |
Use After Free | |
Improper Input Validation | |
Out-of-bounds Read | |
CVE-2024-46820 | |
CVE-2024-46823 | |
CVE-2024-46834 | |
CVE-2024-46861 | |
Improper Validation of Array Index | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-46828 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Handling of Unicode Encoding | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Double Free | |
NULL Pointer Dereference | <0:5.14.0-284.85.1.rt14.370.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.85.1.rt14.370.el9_2 |
Use After Free | <0:5.14.0-284.85.1.rt14.370.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.85.1.rt14.370.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.85.1.rt14.370.el9_2 |
Use After Free | <0:5.14.0-284.85.1.rt14.370.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.85.1.rt14.370.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.85.1.rt14.370.el9_2 |
Use After Free | <0:5.14.0-284.85.1.rt14.370.el9_2 |
Use After Free | |
Deadlock | |
Information Exposure | |
Use After Free | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | |
Integer Underflow | |
CVE-2024-46771 | |
Integer Underflow | |
Out-of-bounds Write | |
CVE-2024-46745 | |
Link Following | |
CVE-2024-46783 | |
NULL Pointer Dereference | |
Use After Free | |
CVE-2024-46777 | |
Out-of-bounds Read | |
Integer Underflow | |
Out-of-bounds Write | |
CVE-2024-46754 | |
NULL Pointer Dereference | |
Use After Free | |
Uncontrolled Recursion | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Control of a Resource Through its Lifetime | |
Out-of-bounds Read | |
Use After Free | |
CVE-2024-46767 | |
NULL Pointer Dereference | |
Resource Injection | |
Improper Resource Shutdown or Release | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
CVE-2024-46715 | |
Improper Initialization | |
NULL Pointer Dereference | |
Race Condition | |
Improper Locking | |
CVE-2024-46787 | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Improper Input Validation | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Memory Leak | <0:5.14.0-284.84.1.rt14.369.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.84.1.rt14.369.el9_2 |
CVE-2024-38573 | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.84.1.rt14.369.el9_2 |
CVE-2024-26974 | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Deadlock | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Improper Input Validation | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Memory Leak | <0:5.14.0-284.84.1.rt14.369.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.84.1.rt14.369.el9_2 |
CVE-2024-38573 | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.84.1.rt14.369.el9_2 |
CVE-2024-26974 | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Deadlock | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Improper Input Validation | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Memory Leak | <0:5.14.0-284.84.1.rt14.369.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.84.1.rt14.369.el9_2 |
CVE-2024-38573 | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.84.1.rt14.369.el9_2 |
CVE-2024-26974 | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Deadlock | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Resource Injection | <0:5.14.0-284.84.1.rt14.369.el9_2 |
Improper Synchronization | |
Resource Injection | |
Race Condition | |
Out-of-Bounds | |
Out-of-Bounds | |
Use of Uninitialized Variable | |
Improper Locking | |
NULL Pointer Dereference | |
CVE-2024-46706 | |
Improper Initialization | |
CVE-2024-46711 | |
Use After Free | |
Improper Authentication | |
Race Condition | |
Time-of-check Time-of-use (TOCTOU) | |
Double Free | |
Improper Locking | |
Multiple Locks of a Critical Resource | |
NULL Pointer Dereference | |
CVE-2024-45017 | |
Out-of-bounds Read | |
Out-of-Bounds | |
Use After Free | |
Out-of-Bounds | |
Improper Control of a Resource Through its Lifetime | |
Insufficient Control Flow Management | |
Use After Free | |
Use of Uninitialized Variable | |
Use of Uninitialized Variable | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Control of a Resource Through its Lifetime | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | |
Uncontrolled Memory Allocation | |
CVE-2024-44984 | |
Improper Check or Handling of Exceptional Conditions | |
Improper Check or Handling of Exceptional Conditions | |
Use After Free | |
Out-of-Bounds | |
Improper Locking | |
Improper Initialization | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
Use of Uninitialized Resource | |
Improper Input Validation | |
Out-of-Bounds | |
Deadlock | |
Improper Initialization | |
Improper Input Validation | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
Integer Overflow or Wraparound | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Divide By Zero | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Input Validation | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Untrusted Pointer Dereference | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35895 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35875 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35839 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-26946 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Divide By Zero | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Input Validation | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Untrusted Pointer Dereference | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35895 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35875 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35839 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-26946 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Divide By Zero | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Input Validation | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Untrusted Pointer Dereference | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Use After Free | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35895 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35875 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-35839 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
CVE-2024-26946 | <0:5.14.0-284.82.1.rt14.367.el9_2 |
Resource Leak | |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Resource Locking | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Zeroization of Hardware Register | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.25.1.rt14.310.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Race Condition | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Execution with Unnecessary Privileges | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Resource Exhaustion | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Interpretation Conflict | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Non-exit on Failed Initialization | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incorrect Control Flow Scoping | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Input Validation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Expected Behavior Violation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Write-what-where Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition During Access to Alternate Channel | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Restriction of Communication Channel to Intended Endpoints | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Insecure Default Initialization of Resource | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Authentication Bypass by Primary Weakness | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Exposure of Resource to Wrong Sphere | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Memory Leak | |
Race Condition | |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
Use After Free | |
Race Condition | |
Divide By Zero | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Divide By Zero | |
Improper Input Validation | |
Use After Free | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Reachable Assertion | |
NULL Pointer Dereference | |
CVE-2024-42107 | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Memory Leak | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Deadlock | <0:5.14.0-284.80.1.rt14.365.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.80.1.rt14.365.el9_2 |
CVE-2024-36000 | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Stack-based Buffer Overflow | <0:5.14.0-284.80.1.rt14.365.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.80.1.rt14.365.el9_2 |
CVE-2024-42107 | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Memory Leak | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Deadlock | <0:5.14.0-284.80.1.rt14.365.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.80.1.rt14.365.el9_2 |
CVE-2024-36000 | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Stack-based Buffer Overflow | <0:5.14.0-284.80.1.rt14.365.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.80.1.rt14.365.el9_2 |
CVE-2024-42107 | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Memory Leak | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Deadlock | <0:5.14.0-284.80.1.rt14.365.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.80.1.rt14.365.el9_2 |
CVE-2024-36000 | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Improper Input Validation | <0:5.14.0-284.80.1.rt14.365.el9_2 |
Stack-based Buffer Overflow | <0:5.14.0-284.80.1.rt14.365.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.80.1.rt14.365.el9_2 |
CVE-2024-42107 | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Double Free | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Race Condition | |
Use After Free | |
Excessive Iteration | |
Buffer Overflow | |
Memory Leak | |
NULL Pointer Dereference | |
Resource Leak | |
Improper Resource Shutdown or Release | |
Resource Leak | |
Improper Check or Handling of Exceptional Conditions | |
Resource Leak | |
Deadlock | |
Resource Injection | |
Resource Leak | |
Improper Access Control | |
NULL Pointer Dereference | |
Incorrect Privilege Assignment | |
NULL Pointer Dereference | |
Resource Injection | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
Improper Input Validation | |
NULL Pointer Dereference | |
Resource Leak | |
Missing Release of Resource after Effective Lifetime | |
NULL Pointer Dereference | |
Incorrect Calculation of Buffer Size | |
Improper Handling of Length Parameter Inconsistency | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
Memory Leak | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
Incorrect Calculation | |
Information Exposure | |
NULL Pointer Dereference | |
Improper Locking | |
Improper Validation of Array Index | |
Use After Free | |
NULL Pointer Dereference | |
Resource Injection | |
Use After Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Missing Initialization of a Variable | |
Reachable Assertion | |
Improper Input Validation | |
Deadlock | |
Deadlock | |
Divide By Zero | |
CVE-2024-42304 | |
Numeric Range Comparison Without Minimum Check | |
Use After Free | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
Out-of-Bounds | |
Improper Input Validation | |
Improper Restriction of Power Consumption | |
NULL Pointer Dereference | |
Return of Wrong Status Code | |
CVE-2024-42322 | |
Multiple Locks of a Critical Resource | |
NULL Pointer Dereference | |
Race Condition | |
Improper Validation of Array Index | |
Use After Free | |
Resource Exhaustion | |
Improper Locking | |
Use After Free | |
Improper Handling of Length Parameter Inconsistency | |
Memory Leak | |
Resource Injection | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Use of Uninitialized Resource | |
NULL Pointer Dereference | |
Improper Input Validation | |
Double Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use of Uninitialized Variable | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use After Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Resource Injection | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use After Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Resource Locking | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35937 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35907 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35852 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Input Validation | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35789 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-27052 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-27046 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Race Condition | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Unchecked Return Value to NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-21823 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Resource Leak | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Resource Locking | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2023-52651 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Double Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use of Uninitialized Variable | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use After Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Resource Injection | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use After Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Resource Locking | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35937 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35907 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35852 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Input Validation | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35789 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-27052 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-27046 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Race Condition | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Unchecked Return Value to NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-21823 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Resource Leak | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Resource Locking | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2023-52651 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Double Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use of Uninitialized Variable | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use After Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Resource Injection | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Use After Free | <0:5.14.0-284.79.1.rt14.364.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Resource Locking | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35937 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35907 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35852 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Input Validation | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-35789 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-27052 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-27046 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Race Condition | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Unchecked Return Value to NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2024-21823 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Resource Leak | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Improper Resource Locking | <0:5.14.0-284.79.1.rt14.364.el9_2 |
CVE-2023-52651 | <0:5.14.0-284.79.1.rt14.364.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.79.1.rt14.364.el9_2 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Allocation of Resources Without Limits or Throttling | |
Resource Exhaustion | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Resource Exhaustion | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Resource Exhaustion | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Resource Injection | |
Resource Injection | |
Improper Locking | |
Resource Injection | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Injection | |
Improper Clearing of Heap Memory Before Release ('Heap Inspection') | |
Resource Injection | |
Improper Input Validation | |
Race Condition | |
Resource Injection | |
Resource Injection | |
Resource Injection | |
Missing Synchronization | |
Improper Initialization | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Resource Injection | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Untrusted Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Race Condition | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35962 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35896 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35885 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35823 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Input Validation | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Resource Locking | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-27030 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Behavioral Change in New Version or Environment | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Double Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Race Condition | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Range Error | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Use After Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Missing Lock Check | <0:5.14.0-284.77.1.rt14.362.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Use After Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Initialization | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Resource Injection | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Untrusted Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Race Condition | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35962 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35896 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35885 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35823 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Input Validation | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Resource Locking | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-27030 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Behavioral Change in New Version or Environment | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Double Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Race Condition | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Range Error | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Use After Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Missing Lock Check | <0:5.14.0-284.77.1.rt14.362.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Use After Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Initialization | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Resource Injection | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Untrusted Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Race Condition | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35962 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35896 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35885 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-35823 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Input Validation | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Improper Resource Locking | <0:5.14.0-284.77.1.rt14.362.el9_2 |
CVE-2024-27030 | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Behavioral Change in New Version or Environment | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Double Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Race Condition | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Range Error | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Use After Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Missing Lock Check | <0:5.14.0-284.77.1.rt14.362.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Use After Free | <0:5.14.0-284.77.1.rt14.362.el9_2 |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
CVE-2024-42151 | |
Improper Validation of Array Index | |
Use of Uninitialized Resource | |
Use of Uninitialized Variable | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Untrusted Pointer Dereference | |
Use of Uninitialized Variable | |
NULL Pointer Dereference | |
Buffer Overflow | |
Improper Handling of Length Parameter Inconsistency | |
NULL Pointer Dereference | |
Resource Management Errors | |
Deadlock | |
Improper Resource Shutdown or Release | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
Integer Overflow or Wraparound | |
Use After Free | |
Improper Resource Locking | |
Resource Injection | |
Excessive Iteration | |
Memory Leak | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Incomplete Internal State Distinction | |
Use After Free | |
CVE-2024-42138 | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
CVE-2024-42129 | |
Allocation of Resources Without Limits or Throttling | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Use After Free | |
CVE-2024-42132 | |
Double Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Access of Uninitialized Pointer | |
NULL Pointer Dereference | |
Use After Free | |
Use of Uninitialized Variable | |
Static Code Injection | |
Information Exposure | |
Incomplete Internal State Distinction | |
CVE-2024-42141 | |
Divide By Zero | |
Double Free | |
Use After Free | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Control of Document Type Definition | |
Incomplete Internal State Distinction | |
Deadlock | |
Stack-based Buffer Overflow | |
Incomplete Internal State Distinction | |
Deadlock | |
Unchecked Return Value | |
NULL Pointer Dereference | |
Resource Injection | |
Resource Injection | |
Information Exposure | |
Deadlock | |
Allocation of Resources Without Limits or Throttling | |
Improper Update of Reference Count | |
NULL Pointer Dereference | |
Memory Leak | |
Improper Input Validation | |
Double Free | |
Unchecked Return Value | |
Stack-based Buffer Overflow | |
Resource Injection | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
NULL Pointer Dereference | |
Heap-based Buffer Overflow | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Race Condition | |
Buffer Overflow | |
Resource Injection | |
Information Exposure | |
Resource Leak | |
Improper Resource Locking | |
Unchecked Return Value | |
Deadlock | |
Improper Input Validation | |
Use After Free | |
Heap-based Buffer Overflow | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Deadlock | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Leak | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35950 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35899 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35897 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35791 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27417 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27065 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27016 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Locking | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Injection | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Handling of Values | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-26581 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Stack-based Buffer Overflow | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Leak | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-Bounds | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Buffer Underflow | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Deadlock | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Leak | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35950 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35899 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35897 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35791 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27417 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27065 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27016 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Locking | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Injection | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Handling of Values | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-26581 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Stack-based Buffer Overflow | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Leak | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-Bounds | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Buffer Underflow | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Deadlock | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Leak | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35950 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35899 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35897 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-35791 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27417 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27065 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-27016 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Locking | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Injection | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Handling of Values | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.75.1.rt14.360.el9_2 |
CVE-2024-26581 | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Stack-based Buffer Overflow | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Resource Leak | <0:5.14.0-284.75.1.rt14.360.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Out-of-Bounds | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Double Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Race Condition | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Buffer Underflow | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | <0:5.14.0-284.75.1.rt14.360.el9_2 |
Use After Free | |
Race Condition | |
Out-of-bounds Read | |
Incorrect Authorization | |
Stack-based Buffer Overflow | |
Improper Input Validation | |
CVE-2024-40998 | |
Resource Injection | |
Use After Free | |
Improper Input Validation | |
Resource Injection | |
Improper Input Validation | |
Resource Injection | |
Deadlock | |
Integer Overflow or Wraparound | |
Improper Update of Reference Count | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Improper Update of Reference Count | |
Improper Input Validation | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Return of Wrong Status Code | |
Out-of-bounds Read | |
Deadlock | |
Resource Injection | |
Use After Free | |
Deadlock | |
Expired Pointer Dereference | |
NULL Pointer Dereference | |
Deadlock | |
Use After Free | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Improper Update of Reference Count | |
Use After Free | |
Resource Injection | |
Expired Pointer Dereference | |
Untrusted Pointer Dereference | |
Resource Injection | |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | |
Deadlock | |
Use After Free | |
Resource Injection | |
Improper Locking | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Resource Injection | |
Improper Initialization | |
Deadlock | |
Out-of-bounds Write | |
Improper Synchronization | |
Use After Free | |
Resource Leak | |
Use of Uninitialized Resource | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Resource Injection | |
Resource Injection | |
Out-of-bounds Read | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Injection | |
Memory Leak | |
Improper Initialization | |
Non-exit on Failed Initialization | |
Memory Leak | |
Out-of-bounds Read | |
Use After Free | |
CVE-2022-48849 | |
Resource Injection | |
Integer Underflow | |
Resource Injection | |
CVE-2022-48834 | |
Resource Injection | |
Use After Free | |
Use After Free | |
Integer Overflow or Wraparound | |
Resource Injection | |
Missing Lock Check | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
Deadlock | |
CVE-2022-48830 | |
Use After Free | |
Race Condition | |
NULL Pointer Dereference | |
Race Condition | |
Out-of-bounds Read | |
CVE-2022-48836 | |
CVE-2022-48831 | |
Resource Leak | |
Resource Management Errors | |
Resource Injection | |
Resource Leak | |
State Issues | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
NULL Pointer Dereference | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Integer Overflow or Wraparound | |
Incorrect Check of Function Return Value | |
Release of Invalid Pointer or Reference | |
NULL Pointer Dereference | |
CVE-2022-48832 | |
CVE-2022-48802 | |
CVE-2022-48811 | |
Resource Injection | |
Permission Issues | |
Improper Update of Reference Count | |
CVE-2022-48785 | |
Deadlock | |
Resource Injection | |
Expired Pointer Dereference | |
Use After Free | |
Race Condition | |
Resource Leak | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Race Condition | |
Use After Free | |
Use After Free | |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-36005 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-35969 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-35898 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-26801 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Mismatched Memory Management Routines | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Divide By Zero | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Race Condition | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Race Condition | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Deadlock | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Improper Handling of Overlap Between Protected Memory Ranges | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Improper Validation of Array Index | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-36005 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-35969 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-35898 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-26801 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Mismatched Memory Management Routines | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Divide By Zero | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Race Condition | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Race Condition | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Deadlock | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Improper Handling of Overlap Between Protected Memory Ranges | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Improper Validation of Array Index | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-36005 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-35969 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-35898 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-26801 | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Mismatched Memory Management Routines | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Divide By Zero | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Race Condition | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Race Condition | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Deadlock | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Improper Handling of Overlap Between Protected Memory Ranges | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Use After Free | <0:5.14.0-284.73.1.rt14.358.el9_2 |
Improper Validation of Array Index | <0:5.14.0-284.73.1.rt14.358.el9_2 |
CVE-2024-39507 | |
CVE-2024-40901 | |
Use After Free | |
CVE-2024-39509 | |
Memory Leak | |
CVE-2024-39490 | |
Out-of-bounds Read | |
CVE-2024-39491 | |
Race Condition | |
CVE-2024-39488 | |
CVE-2024-36936 | |
Out-of-bounds Write | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Out-of-Bounds | |
NULL Pointer Dereference | |
Use After Free | |
Resource Injection | |
Deadlock | |
Covert Timing Channel | |
Out-of-bounds Read | |
Stack-based Buffer Overflow | |
Improper Initialization | |
Deadlock | |
Resource Leak | |
Race Condition | |
Resource Injection | |
Off-by-one Error | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-35960 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-35958 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Use After Free | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27403 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27397 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27393 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Improper Control of a Resource Through its Lifetime | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Off-by-one Error | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-35960 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-35958 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Use After Free | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27403 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27397 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27393 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Improper Control of a Resource Through its Lifetime | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Off-by-one Error | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-35960 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-35958 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Use After Free | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27403 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27397 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
CVE-2024-27393 | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Improper Control of a Resource Through its Lifetime | <0:5.14.0-284.71.1.rt14.356.el9_2 |
Resource Leak | |
Use After Free | |
Resource Injection | |
Double Free | |
Out-of-bounds Read | |
Double Free | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Leak | |
Improper Input Validation | |
Improper Locking | |
Resource Leak | |
Resource Leak | |
Improper Input Validation | |
Improper Locking | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Use After Free | |
Improper Resource Locking | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Resource Injection | |
Incomplete Cleanup | |
Use After Free | |
Use After Free | |
Out-of-Bounds | |
Improper Initialization | |
Race Condition | |
Use of Uninitialized Variable | |
Improper Input Validation | |
Improper Locking | |
Use of Uninitialized Variable | |
Incomplete Cleanup | |
Use After Free | |
Resource Injection | |
Race Condition | |
Deadlock | |
CVE-2024-38573 | |
CVE-2024-38589 | |
Stack-based Buffer Overflow | |
Resource Exhaustion | |
Resource Injection | |
NULL Pointer Dereference | |
Use After Free | |
Improper Input Validation | |
NULL Pointer Dereference | |
Improper Initialization | |
Improper Initialization | |
CVE-2024-38580 | |
NULL Pointer Dereference | |
Memory Leak | |
Out-of-bounds Read | |
Out-of-Bounds | |
Resource Leak | |
Unchecked Return Value | |
Missing Synchronization | |
Incorrect Default Permissions | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
Race Condition | |
Resource Leak | |
CVE-2022-48764 | |
Resource Leak | |
Incomplete Internal State Distinction | |
Missing Initialization of Resource | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2022-48751 | |
Incomplete Cleanup | |
Out-of-bounds Read | |
Resource Injection | |
Buffer Underflow | |
Resource Leak | |
NULL Pointer Dereference | |
Use After Free | |
Resource Leak | |
CVE-2022-48752 | |
Improper Input Validation | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Out-of-bounds Read | |
Use of Uninitialized Variable | |
Out-of-bounds Write | |
Use After Free | |
NULL Pointer Dereference | |
Resource Injection | |
Out-of-bounds Read | |
Resource Leak | |
Missing Standardized Error Handling Mechanism | |
Deadlock | |
Allocation of Resources Without Limits or Throttling | |
NULL Pointer Dereference | |
Divide By Zero | |
Use After Free | |
Use of Uninitialized Variable | |
Release of Invalid Pointer or Reference | |
Race Condition | |
CVE-2021-47607 | |
Use After Free | |
Improper Locking | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Resource Exhaustion | |
Resource Exhaustion | |
Use After Free | |
Out-of-bounds Write | |
Integer Overflow or Wraparound | |
Integer Overflow or Wraparound | |
Resource Injection | |
Out-of-bounds Write | |
Memory Leak | |
Resource Injection | |
CVE-2024-36970 | |
CVE-2024-36966 | |
Resource Injection | |
Use After Free | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Double Free | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Race Condition | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Improper Handling of Exceptional Conditions | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Use After Free | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Double Free | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Race Condition | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Improper Handling of Exceptional Conditions | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Use After Free | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Double Free | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Race Condition | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Improper Handling of Exceptional Conditions | <0:5.14.0-284.69.1.rt14.354.el9_2 |
Buffer Overflow | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
Deadlock | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Resource Leak | |
Use After Free | |
Resource Injection | |
Race Condition | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Out-of-Bounds | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
Resource Leak | |
Stack-based Buffer Overflow | |
Resource Leak | |
Resource Leak | |
Use After Free | |
Resource Leak | |
Resource Injection | |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Cross-site Scripting (XSS) | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.36.1.rt14.321.el9_2 |
CVE-2023-39321 | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Cross-site Scripting (XSS) | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Cross-site Scripting (XSS) | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Use of a Broken or Risky Cryptographic Algorithm | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Use After Free | <0:5.14.0-284.36.1.rt14.321.el9_2 |
CVE-2023-2728 | <0:5.14.0-284.36.1.rt14.321.el9_2 |
CVE-2023-2727 | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Improper Locking | |
Improper Locking | |
Out-of-bounds Read | |
Resource Injection | |
Improper Null Termination | |
Use of Uninitialized Variable | |
Resource Leak | |
Use After Free | |
Resource Injection | |
Improper Input Validation | |
Incomplete Cleanup | |
Improper Locking | |
Resource Leak | |
Resource Injection | |
NULL Pointer Dereference | |
Resource Leak | |
Race Condition | |
Off-by-one Error | |
Divide By Zero | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Improper Initialization | |
NULL Pointer Dereference | |
Use of Uninitialized Variable | |
Resource Leak | |
Integer Overflow or Wraparound | |
Improper Preservation of Permissions | |
NULL Pointer Dereference | |
CVE-2024-36918 | |
Resource Leak | |
Untrusted Pointer Dereference | |
Use After Free | |
Double Free | |
Use After Free | |
Resource Injection | |
Improper Initialization | |
Double Free | |
NULL Pointer Dereference | |
CVE-2024-36920 | |
Resource Injection | |
Out-of-bounds Read | |
Use of Uninitialized Resource | |
Deadlock | |
NULL Pointer Dereference | |
Deadlock | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Out-of-Bounds | |
Leftover Debug Code | |
Race Condition | |
Improper Initialization | |
Out-of-bounds Read | |
Race Condition | |
Memory Leak | |
Deadlock | |
NULL Pointer Dereference | |
Improper Resource Locking | |
Out-of-bounds Write | |
Resource Injection | |
Stack-based Buffer Overflow | |
Out-of-bounds Write | |
CVE-2023-52881 | |
CVE-2024-36015 | |
CVE-2024-26993 | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Integer Underflow | <0:5.14.0-284.67.1.rt14.352.el9_2 |
CVE-2024-26804 | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Use After Free | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Resource Injection | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Race Condition | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Resource Injection | <0:5.14.0-284.67.1.rt14.352.el9_2 |
CVE-2024-26993 | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Integer Underflow | <0:5.14.0-284.67.1.rt14.352.el9_2 |
CVE-2024-26804 | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Use After Free | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Resource Injection | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Race Condition | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Resource Injection | <0:5.14.0-284.67.1.rt14.352.el9_2 |
CVE-2024-26993 | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Integer Underflow | <0:5.14.0-284.67.1.rt14.352.el9_2 |
CVE-2024-26804 | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Use After Free | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Resource Injection | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Race Condition | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Resource Injection | <0:5.14.0-284.67.1.rt14.352.el9_2 |
Resource Injection | |
Memory Leak | |
NULL Pointer Dereference | |
Improper Validation of Array Index | |
Improper Update of Reference Count | |
Information Exposure | |
Out-of-Bounds | |
Resource Exhaustion | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
Memory Leak | |
Memory Leak | |
Improper Update of Reference Count | |
Resource Exhaustion | |
Resource Injection | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | |
Out-of-Bounds | |
Resource Exhaustion | |
Use After Free | |
Memory Leak | |
Race Condition | |
Out-of-bounds Write | |
Double Free | |
CVE-2021-47441 | |
Deadlock | |
Deadlock | |
Resource Leak | |
Improper Initialization | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2021-47290 | |
NULL Pointer Dereference | |
Resource Injection | |
CVE-2021-47272 | |
Out-of-bounds Write | |
Improper Initialization | |
CVE-2021-47276 | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2021-47232 | |
Resource Exhaustion | |
Use After Free | |
Use After Free | |
Out-of-bounds Read | |
Deadlock | |
Resource Leak | |
NULL Pointer Dereference | |
Resource Leak | |
CVE-2021-47222 | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Race Condition | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Out-of-Bounds | |
Use After Free | |
Use After Free | |
Use After Free | |
Improper Initialization | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Dead Code | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Resource Injection | |
NULL Pointer Dereference | |
Double Free | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Use After Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Deadlock | |
Use After Free | |
Improper Resource Locking | |
Use After Free | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Double Free | |
NULL Pointer Dereference | |
Race Condition | |
Resource Injection | |
Use After Free | |
Improper Validation of Array Index | |
Resource Injection | |
Resource Injection | |
Incomplete Cleanup | |
Improper Validation of Array Index | |
Incomplete Cleanup | |
External Control of System or Configuration Setting | |
NULL Pointer Dereference | |
Improper Input Validation | |
Resource Injection | |
NULL Pointer Dereference | |
Use After Free | |
Memory Leak | |
Stack-based Buffer Overflow | |
NULL Pointer Dereference | |
Memory Leak | |
External Control of System or Configuration Setting | |
Improper Input Validation | |
Improper Input Validation | |
NULL Pointer Dereference | |
Incomplete Cleanup | |
NULL Pointer Dereference | |
Resource Leak | |
Improper Resource Shutdown or Release | |
Stack-based Buffer Overflow | |
Divide By Zero | |
Out-of-bounds Read | |
Race Condition | |
Improper Locking | |
Double Free | |
Improper Resource Shutdown or Release | |
Missing Initialization of a Variable | |
Resource Injection | |
Use After Free | |
CVE-2021-47455 | |
Resource Injection | |
Memory Leak | |
Improper Check for Unusual or Exceptional Conditions | |
Improper Control of a Resource Through its Lifetime | |
Resource Leak | |
NULL Pointer Dereference | |
CVE-2021-47384 | |
Incomplete Cleanup | |
CVE-2021-47432 | |
Resource Leak | |
CVE-2021-47430 | |
Resource Leak | |
Improper Input Validation | |
NULL Pointer Dereference | |
CVE-2021-47377 | |
Out-of-bounds Read | |
Access of Uninitialized Pointer | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Memory Leak | |
CVE-2021-47327 | |
Improper Input Validation | |
Out-of-bounds Write | |
Out-of-bounds Read | |
Resource Leak | |
Resource Injection | |
Reachable Assertion | |
Use After Free | |
Resource Leak | |
Resource Leak | |
Resource Leak | |
Use After Free | |
Deadlock | |
NULL Pointer Dereference | |
CVE-2024-35998 | |
CVE-2024-35976 | |
CVE-2024-36000 | |
Memory Leak | |
CVE-2024-35995 | |
CVE-2024-35926 | |
CVE-2024-35957 | |
CVE-2024-35966 | |
CVE-2024-35958 | |
CVE-2024-35960 | |
CVE-2024-35964 | |
CVE-2024-35944 | |
CVE-2024-35950 | |
CVE-2024-35962 | |
CVE-2024-35939 | |
CVE-2024-36004 | |
CVE-2024-35946 | |
CVE-2024-35989 | |
CVE-2024-35979 | |
CVE-2024-35959 | |
CVE-2024-35942 | |
CVE-2024-35884 | |
CVE-2024-35963 | |
CVE-2024-35952 | |
CVE-2024-35872 | |
CVE-2024-35923 | |
CVE-2024-35918 | |
CVE-2024-35867 | |
Use After Free | |
CVE-2024-35879 | |
Use After Free | |
CVE-2024-35885 | |
CVE-2024-35868 | |
Use After Free | |
CVE-2024-35875 | |
CVE-2024-36005 | |
CVE-2024-35860 | |
CVE-2024-35861 | |
CVE-2024-35981 | |
Use After Free | |
CVE-2024-35969 | |
CVE-2024-35983 | |
CVE-2024-35974 | |
CVE-2024-35934 | |
CVE-2024-35945 | |
CVE-2024-35922 | |
CVE-2024-35980 | |
CVE-2024-36002 | |
CVE-2024-35880 | |
Use After Free | |
CVE-2024-35991 | |
CVE-2024-36007 | |
CVE-2024-35869 | |
CVE-2024-35999 | |
CVE-2024-35973 | |
CVE-2024-35876 | |
CVE-2024-36006 | |
CVE-2024-35967 | |
CVE-2024-35937 | |
CVE-2024-35933 | |
CVE-2024-35865 | |
Memory Leak | |
CVE-2024-36003 | |
CVE-2024-35938 | |
CVE-2024-35925 | |
CVE-2024-35924 | |
CVE-2024-35965 | |
CVE-2024-35878 | |
CVE-2024-35877 | |
CVE-2024-35890 | |
CVE-2024-35931 | |
CVE-2024-35894 | |
CVE-2024-35897 | |
CVE-2024-35896 | |
CVE-2024-35947 | |
CVE-2024-35899 | |
CVE-2024-35904 | |
CVE-2024-35930 | |
CVE-2024-35912 | |
CVE-2024-35927 | |
CVE-2024-35908 | |
CVE-2024-35892 | |
CVE-2024-35907 | |
CVE-2024-35901 | |
CVE-2024-35895 | |
CVE-2024-35891 | |
CVE-2024-35886 | |
CVE-2024-35900 | |
CVE-2024-35905 | |
CVE-2024-35917 | |
CVE-2024-35898 | |
CVE-2024-35928 | |
CVE-2024-35929 | |
CVE-2024-35913 | |
CVE-2024-35911 | |
CVE-2024-35903 | |
CVE-2024-35888 | |
CVE-2023-52662 | |
CVE-2023-52663 | |
CVE-2023-52661 | |
CVE-2024-35810 | |
CVE-2024-35859 | |
CVE-2024-35853 | |
CVE-2024-35823 | |
CVE-2024-35847 | |
CVE-2024-35803 | |
CVE-2024-35840 | |
CVE-2024-35855 | |
CVE-2024-35818 | |
CVE-2024-35817 | |
CVE-2024-35808 | |
CVE-2024-35794 | |
CVE-2024-35812 | |
CVE-2024-35824 | |
CVE-2024-35805 | |
CVE-2024-35789 | |
CVE-2024-35787 | |
CVE-2024-35790 | |
CVE-2024-35848 | |
CVE-2024-27435 | |
CVE-2024-35839 | |
NULL Pointer Dereference | |
Improper Input Validation | |
CVE-2024-35836 | |
CVE-2024-35800 | |
Resource Leak | |
CVE-2024-35854 | |
CVE-2024-35807 | |
Missing Synchronization | |
CVE-2024-27404 | |
CVE-2024-27417 | |
CVE-2024-27431 | |
CVE-2024-27415 | |
CVE-2024-35838 | |
CVE-2024-35852 | |
CVE-2024-35814 | |
CVE-2024-35843 | |
Resource Exhaustion | |
CVE-2024-35797 | |
CVE-2024-35834 | |
CVE-2024-35835 | |
CVE-2024-35827 | |
CVE-2024-35801 | |
CVE-2024-35822 | |
CVE-2024-27414 | |
CVE-2024-27403 | |
CVE-2024-35809 | |
CVE-2024-27436 | |
CVE-2024-35826 | |
CVE-2024-35804 | |
CVE-2024-35791 | |
CVE-2024-35802 | |
CVE-2024-27413 | |
CVE-2024-27434 | |
CVE-2024-27410 | |
CVE-2023-52669 | |
CVE-2023-52680 | |
CVE-2023-52658 | |
CVE-2023-52679 | |
CVE-2023-52674 | |
CVE-2023-52698 | |
CVE-2023-52696 | |
CVE-2023-52686 | |
Double Free | |
CVE-2023-52676 | |
CVE-2023-52675 | |
CVE-2023-52659 | |
CVE-2023-52664 | |
CVE-2023-52689 | |
CVE-2023-52690 | |
CVE-2023-52697 | |
CVE-2023-52683 | |
CVE-2023-52672 | |
CVE-2024-27393 | |
CVE-2024-27399 | |
CVE-2024-27398 | |
CVE-2024-27397 | |
CVE-2024-27395 | |
CVE-2024-21823 | |
CVE-2023-52656 | |
CVE-2023-52654 | |
CVE-2024-25744 | <0:5.14.0-284.66.1.rt14.351.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.66.1.rt14.351.el9_2 |
CVE-2024-25744 | <0:5.14.0-284.66.1.rt14.351.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.66.1.rt14.351.el9_2 |
CVE-2024-25744 | <0:5.14.0-284.66.1.rt14.351.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.66.1.rt14.351.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Cross-site Scripting (XSS) | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.36.1.rt14.321.el9_2 |
CVE-2023-39321 | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Cross-site Scripting (XSS) | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Cross-site Scripting (XSS) | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Use of a Broken or Risky Cryptographic Algorithm | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Use After Free | <0:5.14.0-284.36.1.rt14.321.el9_2 |
CVE-2023-2728 | <0:5.14.0-284.36.1.rt14.321.el9_2 |
CVE-2023-2727 | <0:5.14.0-284.36.1.rt14.321.el9_2 |
Resource Exhaustion | <0:5.14.0-284.36.1.rt14.321.el9_2 |
CVE-2024-26974 | |
CVE-2022-48702 | |
Memory Leak | |
CVE-2022-48694 | |
CVE-2022-48704 | |
Race Condition | |
CVE-2022-48705 | |
CVE-2022-48703 | |
Improper Locking | |
Off-by-one Error | |
CVE-2022-48695 | <0:5.14.0-284.11.1.rt14.296.el9_2 |
CVE-2022-48701 | |
Improper Handling of Exceptional Conditions | |
CVE-2022-48697 | |
CVE-2022-48690 | |
CVE-2024-27057 | |
CVE-2024-27390 | |
CVE-2024-27073 | |
CVE-2024-27077 | |
CVE-2024-27003 | |
CVE-2024-27030 | |
Race Condition | |
CVE-2024-27011 | |
Race Condition | |
CVE-2024-27017 | |
CVE-2024-27038 | |
CVE-2024-27052 | |
CVE-2024-26993 | |
CVE-2024-27026 | |
CVE-2024-27389 | |
CVE-2024-27010 | |
CVE-2024-26991 | |
CVE-2024-27065 | |
CVE-2024-27049 | |
CVE-2024-27048 | |
CVE-2024-27056 | |
CVE-2024-27042 | |
CVE-2024-27004 | |
CVE-2024-26976 | |
CVE-2024-27016 | |
Improper Locking | |
CVE-2024-27027 | |
Behavioral Change in New Version or Environment | |
CVE-2024-26989 | |
CVE-2024-27025 | |
Improper Locking | |
CVE-2024-27031 | |
Improper Resource Locking | |
NULL Pointer Dereference | |
CVE-2024-26975 | |
CVE-2024-27059 | |
CVE-2024-27023 | |
CVE-2024-26962 | |
Allocation of Resources Without Limits or Throttling | |
Out-of-bounds Read | |
Double Free | |
CVE-2024-26938 | |
CVE-2024-27046 | |
Race Condition | |
CVE-2024-27055 | |
CVE-2024-27079 | |
CVE-2024-26988 | |
CVE-2024-26992 | |
Race Condition | |
Incomplete Cleanup | |
Memory Leak | |
CVE-2024-26999 | |
CVE-2024-26990 | |
CVE-2024-26953 | |
CVE-2024-26950 | |
CVE-2024-26973 | |
CVE-2024-26958 | |
CVE-2024-27039 | |
Improper Locking | |
CVE-2024-26945 | |
CVE-2024-26960 | |
CVE-2024-26951 | |
Improper Locking | |
NULL Pointer Dereference | |
CVE-2024-27015 | |
CVE-2024-26946 | |
CVE-2024-26939 | |
CVE-2024-26964 | |
Reachable Assertion | |
CVE-2024-26935 | |
Double Free | |
Improper Input Validation | |
CVE-2023-52651 | |
CVE-2023-52650 | |
CVE-2023-52653 | |
CVE-2023-52649 | |
CVE-2023-52648 | |
CVE-2022-48669 | |
Stack-based Buffer Overflow | |
Improper Neutralization of Null Byte or NUL Character | |
Improper Input Validation | |
Race Condition | |
Use After Free | |
Deadlock | |
CVE-2024-25743 | <0:5.14.0-284.64.1.rt14.349.el9_2 |
CVE-2024-25742 | <0:5.14.0-284.64.1.rt14.349.el9_2 |
CVE-2024-25743 | <0:5.14.0-284.64.1.rt14.349.el9_2 |
CVE-2024-25742 | <0:5.14.0-284.64.1.rt14.349.el9_2 |
CVE-2024-25743 | <0:5.14.0-284.64.1.rt14.349.el9_2 |
CVE-2024-25742 | <0:5.14.0-284.64.1.rt14.349.el9_2 |
Use After Free | |
Out-of-Bounds | |
Integer Underflow | |
NULL Pointer Dereference | |
Double Free | |
Integer Underflow | |
CVE-2022-48662 | |
Integer Overflow or Wraparound | |
Use After Free | |
Improper Handling of Values | |
Incomplete Internal State Distinction | |
Resource Exhaustion | |
NULL Pointer Dereference | |
Modules with Circular Dependencies | |
Resource Exhaustion | |
Access of Uninitialized Pointer | |
NULL Pointer Dereference | |
Attempt to Access Child of a Non-structure Pointer | |
NULL Pointer Dereference | |
Heap-based Buffer Overflow | |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Exhaustion | |
Integer Underflow | |
Resource Leak | |
Improper Validation of Specified Index, Position, or Offset in Input | |
Use After Free | |
Race Condition | |
Race Condition | |
Improper Locking | |
Improper Input Validation | |
Deadlock | |
NULL Pointer Dereference | |
Resource Leak | |
NULL Pointer Dereference | |
Race Condition | |
Buffer Underflow | |
Race Condition | |
Race Condition | |
Resource Injection | |
Improper Input Validation | |
Buffer Overflow | |
Incomplete Cleanup | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Resource Injection | |
Race Condition | |
Race Condition | |
Race Condition | |
Unchecked Return Value to NULL Pointer Dereference | |
Resource Leak | |
Use After Free | |
Race Condition | |
Resource Leak | |
Resource Leak | |
Resource Injection | |
CVE-2024-26920 | |
Unchecked Return Value to NULL Pointer Dereference | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Improper Input Validation | |
Memory Leak | |
Out-of-bounds Read | |
Resource Injection | |
Improper Input Validation | |
Race Condition | |
CVE-2024-26918 | |
Data Element containing Pointer Item without Proper Copy Control Element | |
Improper Resource Locking | |
Improper Input Validation | |
Stack-based Buffer Overflow | |
Use After Free | |
Improper Input Validation | |
Improper Input Validation | |
Improper Input Validation | |
Divide By Zero | |
NULL Pointer Dereference | |
Resource Leak | |
Out-of-bounds Write | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Return of Wrong Status Code | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Use After Free | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Information Exposure | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Return of Wrong Status Code | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Use After Free | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Information Exposure | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Return of Wrong Status Code | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Use After Free | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Information Exposure | <0:5.14.0-284.62.1.rt14.347.el9_2 |
Improper Input Validation | |
Buffer Access with Incorrect Length Value | |
NULL Pointer Dereference | |
Resource Leak | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Resource Leak | |
Improper Input Validation | |
Excessive Platform Resource Consumption within a Loop | |
Improper Neutralization of Null Byte or NUL Character | |
Out-of-bounds Read | |
Improper Handling of Unicode Encoding | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Resource Injection | |
NULL Pointer Dereference | |
Race Condition | |
CVE-2024-26782 | |
CVE-2024-26786 | |
Mismatched Memory Management Routines | |
Resource Injection | |
CVE-2024-26803 | |
Use After Free | |
Resource Exhaustion | |
CVE-2024-26804 | |
CVE-2024-26801 | |
Improper Input Validation | |
Deadlock | |
Improper Handling of Values | |
Divide By Zero | |
Improper Handling of Values | |
Incomplete Cleanup | |
Race Condition | |
Improper Null Termination | |
Improper Input Validation | |
Deadlock | |
Divide By Zero | |
Race Condition | |
Unchecked Input for Loop Condition | |
Use After Free | |
Improper Null Termination | |
NULL Pointer Dereference | |
Deadlock | |
Resource Injection | |
Double Free | |
Deadlock | |
Race Condition | |
Heap-based Buffer Overflow | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Divide By Zero | |
Improper Input Validation | |
Improper Null Termination | |
Resource Injection | |
Improper Input Validation | |
Improper Handling of Undefined Parameters | |
Race Condition | |
NULL Pointer Dereference | |
Race Condition | |
Improper Input Validation | |
Deadlock | |
Use After Free | |
NULL Pointer Dereference | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Resource Injection | |
Use After Free | |
Improper Input Validation | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
CVE-2024-26707 | |
Resource Injection | |
Use After Free | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Use After Free | |
Deadlock | |
Race Condition | |
Resource Injection | |
Unchecked Input for Loop Condition | |
Improper Protection Against Physical Side Channels | |
Improper Input Validation | |
Use After Free | |
CVE-2024-26666 | |
Resource Injection | |
Out-of-bounds Read | |
Improper Input Validation | |
Out-of-Bounds | |
Resource Leak | |
Out-of-bounds Read | |
Resource Injection | |
Resource Injection | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Improper Input Validation | |
Resource Injection | |
Missing Lock Check | |
Improper Locking | |
Integer Underflow | |
Improper Handling of Unicode Encoding | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Improper Handling of Unicode Encoding | <0:5.14.0-284.16.1.rt14.301.el9_2 |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Deadlock | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Race Condition | |
Resource Injection | |
Out-of-bounds Read | |
Race Condition | |
Resource Injection | |
Incorrect Calculation of Buffer Size | |
Improper Resource Locking | |
Resource Injection | |
CVE-2024-26602 | <0:5.14.0-284.59.1.rt14.344.el9_2 |
Integer Underflow | <0:5.14.0-284.59.1.rt14.344.el9_2 |
CVE-2024-26602 | <0:5.14.0-284.59.1.rt14.344.el9_2 |
Integer Underflow | <0:5.14.0-284.59.1.rt14.344.el9_2 |
CVE-2024-26602 | <0:5.14.0-284.59.1.rt14.344.el9_2 |
Integer Underflow | <0:5.14.0-284.59.1.rt14.344.el9_2 |
Race Condition | |
CVE-2023-28746 | |
Improper Input Validation | |
Improper Input Validation | |
Missing Initialization of a Variable | |
Improper Input Validation | |
Resource Injection | |
Missing Lock Check | |
Resource Exhaustion | |
Resource Injection | |
Stack-based Buffer Overflow | |
Stack-based Buffer Overflow | |
Resource Leak | |
Unchecked Input for Loop Condition | |
Memory Leak | |
Return of Wrong Status Code | |
Use After Free | |
Use of NullPointerException Catch to Detect NULL Pointer Dereference | |
Improper Input Validation | |
Out-of-bounds Read | |
Improper Input Validation | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Improper Input Validation | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Resource Locking | |
Deadlock | |
Deadlock | |
NULL Pointer Dereference | |
Deadlock | |
Improper Resource Locking | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Resource Exhaustion | |
Return of Stack Variable Address | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Improper Resource Shutdown or Release | |
NULL Pointer Dereference | |
Improper Protection Against Physical Side Channels | |
NULL Pointer Dereference | |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.57.1.rt14.342.el9_2 |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.57.1.rt14.342.el9_2 |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.57.1.rt14.342.el9_2 |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Read | |
Use of Uninitialized Variable | |
Improper Input Validation | |
Integer Overflow or Wraparound | |
Resource Leak | |
Integer Overflow or Wraparound | |
NULL Pointer Dereference | |
CVE-2024-26602 | |
Unchecked Return Value | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Stack-based Buffer Overflow | |
Incorrect Calculation of Buffer Size | |
Race Condition | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2023-52520 | |
CVE-2023-52575 | |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Improper Input Validation | |
Improper Input Validation | |
Race Condition | |
Resource Leak | |
Memory Leak | |
Memory Leak | |
Resource Injection | |
Improper Handling of Overlap Between Protected Memory Ranges | |
Missing Encryption of Sensitive Data | |
Use After Free | |
NULL Pointer Dereference | |
Resource Leak | |
Resource Leak | |
Resource Injection | |
Resource Leak | |
NULL Pointer Dereference | |
Memory Leak | |
Use After Free | |
Memory Leak | |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Race Condition | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Race Condition | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Race Condition | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Use After Free | <0:5.14.0-284.55.1.rt14.340.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.55.1.rt14.340.el9_2 |
Deadlock | |
Use After Free | |
Out-of-bounds Read | |
Resource Leak | |
Deadlock | |
Out-of-Bounds | |
Use After Free | |
Resource Leak | |
Resource Leak | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Use After Free | |
Use After Free | |
Resource Leak | |
Resource Leak | |
Race Condition | |
Improper Check or Handling of Exceptional Conditions | |
Stack-based Buffer Overflow | |
Use After Free | |
Resource Leak | |
Range Error | |
Improper Input Validation | |
Resource Injection | |
Missing Support for Integrity Check | |
Unchecked Error Condition | |
Use After Free | |
Integer Overflow or Wraparound | |
Out-of-bounds Read | |
CVE-2023-52474 | |
Race Condition | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Range Error | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
NULL Pointer Dereference | |
Deadlock | |
Use After Free | |
NULL Pointer Dereference | |
Untrusted Pointer Dereference | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
CVE-2023-52462 | |
Use After Free | |
NULL Pointer Dereference | |
CVE-2023-52455 | |
Out-of-bounds Read | |
Buffer Access with Incorrect Length Value | |
NULL Pointer Dereference | |
Improper Initialization | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Return of Wrong Status Code | |
Use After Free | |
CVE-2024-26581 | |
Out-of-Bounds | |
Use After Free | |
Improper Authentication | |
Memory Leak | |
Improper Check for Unusual or Exceptional Conditions | |
CVE-2024-25744 | |
Stack-based Buffer Overflow | |
Resource Exhaustion | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Memory Leak | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Use After Free | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Memory Leak | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Memory Leak | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Use After Free | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Memory Leak | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Memory Leak | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Use After Free | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Allocation of Resources Without Limits or Throttling | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Memory Leak | <0:5.14.0-284.52.1.rt14.337.el9_2 |
Time-of-check Time-of-use (TOCTOU) | |
Time-of-check Time-of-use (TOCTOU) | |
Resource Exhaustion | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Information Exposure | |
Use After Free | |
Integer Overflow or Wraparound | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Handling of Unicode Encoding | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Arbitrary Code Injection | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Resource Exhaustion | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Directory Traversal | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Use of a Broken or Risky Cryptographic Algorithm | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Integer Overflow or Wraparound | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Handling of Unicode Encoding | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Arbitrary Code Injection | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Resource Exhaustion | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Directory Traversal | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Use of a Broken or Risky Cryptographic Algorithm | <0:5.14.0-284.16.1.rt14.301.el9_2 |
Information Exposure | |
Integer Overflow or Wraparound | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | |
Resource Exhaustion | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Privilege Management | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Buffer Overflow | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Input Validation | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Validation of Array Index | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.48.1.rt14.333.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Incorrect Calculation | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Information Exposure | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Privilege Management | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Buffer Overflow | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Input Validation | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Validation of Array Index | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.48.1.rt14.333.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Incorrect Calculation | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Information Exposure | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Privilege Management | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Buffer Overflow | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Input Validation | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Improper Validation of Array Index | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.48.1.rt14.333.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Incorrect Calculation | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Information Exposure | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | <0:5.14.0-284.48.1.rt14.333.el9_2 |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Out-of-bounds Write | |
Deadlock | |
Improper Handling of Values | |
Deadlock | |
Integer Underflow | |
NULL Pointer Dereference | |
Resource Leak | |
Out-of-Bounds | |
Use After Free | |
Information Exposure | |
Out-of-bounds Write | |
Race Condition | |
Use After Free | |
Memory Leak | |
Race Condition | |
Race Condition | |
NULL Pointer Dereference | |
Use After Free | |
Out-of-bounds Write | |
Use After Free | |
Out-of-Bounds | |
Man-in-the-Middle (MitM) | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
NULL Pointer Dereference | |
Sensitive Information Uncleared Before Release | |
Out-of-bounds Read | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Insufficient Comparison | |
Resource Exhaustion | |
Authentication Bypass | |
Allocation of Resources Without Limits or Throttling | |
Double Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Integer Underflow | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Double Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Information Exposure | <0:5.14.0-284.40.1.rt14.325.el9_2 |
CVE-2022-27672 | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Double Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Integer Underflow | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Double Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Information Exposure | <0:5.14.0-284.40.1.rt14.325.el9_2 |
CVE-2022-27672 | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Double Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Integer Underflow | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Use After Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Double Free | <0:5.14.0-284.40.1.rt14.325.el9_2 |
Information Exposure | <0:5.14.0-284.40.1.rt14.325.el9_2 |
CVE-2022-27672 | <0:5.14.0-284.40.1.rt14.325.el9_2 |
NULL Pointer Dereference | |
Out-of-bounds Read | |
Information Exposure | |
Race Condition | |
Use After Free | |
Improper Handling of Exceptional Conditions | |
NULL Pointer Dereference | |
Out-of-bounds Write | |
Improper Privilege Management | |
Improper Update of Reference Count | |
Buffer Overflow | |
Double Free | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Out-of-bounds Read | |
Use After Free | |
NULL Pointer Dereference | |
Improper Input Validation | |
Use After Free | |
Race Condition | |
Integer Underflow | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Improper Access Control | |
Use After Free | |
Stack-based Buffer Overflow | |
Improper Validation of Array Index | |
Information Exposure | |
Out-of-bounds Read | |
Use After Free | |
Time-of-check Time-of-use (TOCTOU) | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Zeroization of Hardware Register | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Zeroization of Hardware Register | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Zeroization of Hardware Register | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Zeroization of Hardware Register | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Double Free | |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | |
Information Exposure | |
Out-of-bounds Read | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Use After Free | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Race Condition | |
Double Free | |
Use of a Broken or Risky Cryptographic Algorithm | |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.25.1.rt14.310.el9_2 |
NULL Pointer Dereference | |
Race Condition | |
Race Condition | |
Out-of-bounds Read | |
NULL Pointer Dereference | |
Use After Free | |
Improper Resource Locking | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Resource Locking | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Resource Locking | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Improper Resource Locking | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Incorrect Bitwise Shift of Integer | |
CVE-2023-31084 | |
Divide By Zero | |
Race Condition | |
Release of Invalid Pointer or Reference | |
Reachable Assertion | |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Execution with Unnecessary Privileges | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Execution with Unnecessary Privileges | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Execution with Unnecessary Privileges | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Execution with Unnecessary Privileges | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.25.1.rt14.310.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.25.1.rt14.310.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.25.1.rt14.310.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Improper Resource Locking | |
Exposure of Resource to Wrong Sphere | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Exposure of Resource to Wrong Sphere | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Exposure of Resource to Wrong Sphere | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Exposure of Resource to Wrong Sphere | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Update of Reference Count | |
Improperly Implemented Security Check for Standard | |
Out-of-bounds Write | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Read | |
Out-of-bounds Read | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Out-of-bounds Read | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | |
Use After Free | |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Use After Free | |
Out-of-bounds Read | |
Use After Free | |
Use After Free | |
Double Free | |
Interpretation Conflict | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Interpretation Conflict | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Interpretation Conflict | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Interpretation Conflict | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Sensitive Information Uncleared Before Release | <0:5.14.0-284.30.1.rt14.315.el9_2 |
Out-of-bounds Read | |
Use After Free | |
Improper Initialization | |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
Use After Free | <0:5.14.0-284.18.1.rt14.303.el9_2 |
NULL Pointer Dereference | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
CVE-2022-27672 | |
Use After Free | |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Memory Leak | |
Out-of-bounds Write | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Externally Controlled Reference to a Resource in Another Sphere | |
Memory Leak | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Write-what-where Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Write-what-where Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Write-what-where Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Write-what-where Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Insecure Default Initialization of Resource | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Insecure Default Initialization of Resource | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Insecure Default Initialization of Resource | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Insecure Default Initialization of Resource | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | |
Non-exit on Failed Initialization | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Non-exit on Failed Initialization | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Non-exit on Failed Initialization | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Non-exit on Failed Initialization | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | |
Information Exposure | |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Logging of Excessive Data | |
Integer Overflow or Wraparound | |
Memory Leak | |
Memory Leak | |
Race Condition | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Race Condition | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Race Condition | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Race Condition | <0:5.14.0-284.25.1.rt14.310.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Memory Leak | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | |
Improper Locking | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Access of Uninitialized Pointer | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition During Access to Alternate Channel | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition During Access to Alternate Channel | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition During Access to Alternate Channel | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition During Access to Alternate Channel | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Access of Resource Using Incompatible Type ('Type Confusion') | |
Authentication Bypass by Primary Weakness | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Authentication Bypass by Primary Weakness | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Authentication Bypass by Primary Weakness | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Authentication Bypass by Primary Weakness | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Expected Behavior Violation | |
Incorrect Control Flow Scoping | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incorrect Control Flow Scoping | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incorrect Control Flow Scoping | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incorrect Control Flow Scoping | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Input Validation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Input Validation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Input Validation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Input Validation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | |
NULL Pointer Dereference | |
Integer Overflow or Wraparound | |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Buffer Overflow | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-Bounds | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Read | |
Expected Behavior Violation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Expected Behavior Violation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Expected Behavior Violation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Expected Behavior Violation | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Restriction of Communication Channel to Intended Endpoints | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Restriction of Communication Channel to Intended Endpoints | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Restriction of Communication Channel to Intended Endpoints | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Restriction of Communication Channel to Intended Endpoints | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Read | |
Improper Update of Reference Count | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Update of Reference Count | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Locking | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Incomplete Cleanup | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Out-of-bounds Write | |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
NULL Pointer Dereference | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Time-of-check Time-of-use (TOCTOU) | |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Use After Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Race Condition | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Improper Cross-boundary Removal of Sensitive Data | |
Race Condition | |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Double Free | <0:5.14.0-284.11.1.rt14.296.el9_2 |
Information Exposure | |
Information Exposure | |
Memory Leak | |
Out-of-bounds Write | |
Improper Preservation of Permissions | |
Buffer Overflow | |
Memory Leak | |
Allocation of Resources Without Limits or Throttling | |
Release of Invalid Pointer or Reference | |
Out-of-Bounds | |
Out-of-bounds Write | |