kernel-tools-debuginfo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-tools-debuginfo package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-38564

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-27399

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-27043

<0:4.18.0-553.30.1.el8_10
  • M
Use After Free

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50256

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50192

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50142

<0:4.18.0-553.32.1.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50099

<0:4.18.0-553.32.1.el8_10
  • M
CVE-2024-50082

<0:4.18.0-553.32.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.32.1.el8_10
  • M
Incorrect Default Permissions

<0:4.18.0-553.32.1.el8_10
  • M
Race Condition

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-46826

<0:4.18.0-553.27.1.el8_10
  • M
Improper Initialization

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43892

<0:4.18.0-553.27.1.el8_10
  • M
Divide By Zero

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43880

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
Improper Validation of Array Index

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42292

<0:4.18.0-553.27.1.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42244

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-41042

<0:4.18.0-553.27.1.el8_10
  • M
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40984

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40983

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-39503

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38586

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38541

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38540

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35939

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35898

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35839

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27062

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27017

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26976

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26851

<0:4.18.0-553.27.1.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2023-52492

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2022-48936

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • H
CVE-2024-40974

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-40927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-39502

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-39276

<0:4.18.0-553.16.1.el8_10
  • H
Double Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38615

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38596

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38575

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-38573

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36960

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36954

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36950

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36945

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36941

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36940

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36933

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36929

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36921

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36917

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36905

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36904

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36896

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36889

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36886

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36286

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36025

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36020

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36017

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36016

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36010

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36006

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36005

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36000

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35952

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35947

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35946

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35938

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35937

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35930

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35924

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35912

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35910

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35900

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35899

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35897

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35896

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35893

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35876

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35847

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35824

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35814

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35810

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35807

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35801

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35790

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-33621

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-31076

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27434

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27395

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27388

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27065

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27025

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27011

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27010

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26961

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26960

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26958

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26940

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26921

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26878

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26870

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26853

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26852

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26843

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26840

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26837

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26810

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26802

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26773

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26772

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26740

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26733

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26704

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26698

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26686

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26669

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26660

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26640

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26614

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-2201

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-21823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52864

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52847

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52845

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52834

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52832

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52811

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52803

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52796

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52791

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52784

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52777

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52775

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52764

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52762

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52756

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52730

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52707

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52679

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52662

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52658

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52653

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52648

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52623

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52622

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52619

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52486

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
Use After Free

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-28746

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48757

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48747

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48632

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47624

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47579

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47548

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47491

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47468

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47461

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47408

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47373

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47304

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47284

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47257

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47018

<0:4.18.0-553.16.1.el8_10
  • H
Improper Synchronization

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36007

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-36004

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35960

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35959

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35958

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35890

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35888

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35855

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35854

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35853

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35852

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35845

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35838

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35835

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-35789

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-27410

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-27397

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26982

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26974

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26907

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26906

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26859

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26826

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26804

<0:4.18.0-553.8.1.el8_10
  • H
Use After Free

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26759

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26735

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26675

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2024-26656

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
Race Condition

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52881

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52878

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52877

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52835

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52813

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52781

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52703

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52700

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52686

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52675

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52669

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52667

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2023-52626

<0:4.18.0-553.8.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.8.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.8.1.el8_10
  • H
Out-of-Bounds

<0:4.18.0-553.8.1.el8_10
  • H
Improper Handling of Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47495

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47456

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47356

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47353

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47311

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47310

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47236

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47073

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-47069

<0:4.18.0-553.8.1.el8_10
  • H
CVE-2021-46972

<0:4.18.0-553.8.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.8.1.el8_10
  • H
Incorrect Authorization

<0:4.18.0-553.8.1.el8_10
  • M
CVE-2024-27059

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27056

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27052

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-27048

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26993

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26973

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26964

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26919

<0:4.18.0-553.5.1.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26671

<0:4.18.0-553.el8_10
  • M
CVE-2024-26897

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26609

<0:4.18.0-553.el8_10
  • M
CVE-2024-26892

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26602

<0:4.18.0-553.el8_10
  • M
CVE-2024-26872

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-25743

<0:4.18.0-553.el8_10
  • M
CVE-2024-26779

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-25742

<0:4.18.0-553.el8_10
  • M
CVE-2024-26744

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
CVE-2024-26743

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2024-26694

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
CVE-2024-26693

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
CVE-2024-26664

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
CVE-2024-26659

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2024-26643

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2024-26642

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52620

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52581

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52580

<0:4.18.0-553.el8_10
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52489

<0:4.18.0-553.el8_10
  • M
CVE-2024-25744

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • M
CVE-2024-0340

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52340

<0:4.18.0-553.el8_10
  • M
Information Exposure

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2023-52610

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-51779

<0:4.18.0-553.el8_10
  • M
CVE-2023-52607

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • M
CVE-2023-52606

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-52598

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Improper Locking

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Improper Validation of Array Index

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Race Condition

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Use of Uninitialized Resource

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2023-52520

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-38409

<0:4.18.0-553.el8_10
  • M
Double Free

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
CVE-2022-48669

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2022-48627

<0:4.18.0-553.5.1.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
CVE-2021-47185

<0:4.18.0-553.5.1.el8_10
  • M
Race Condition

<0:4.18.0-553.el8_10
  • M
Memory Leak

<0:4.18.0-553.5.1.el8_10
  • M
Double Free

<0:4.18.0-553.el8_10
  • M
CVE-2021-47153

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-25775

<0:4.18.0-553.el8_10
  • M
CVE-2021-47118

<0:4.18.0-553.5.1.el8_10
  • M
CVE-2023-24023

<0:4.18.0-553.el8_10
  • M
CVE-2021-47055

<0:4.18.0-553.5.1.el8_10
  • M
Improper Initialization

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.5.1.el8_10
  • M
Improper Synchronization

<0:4.18.0-553.el8_10
  • M
Memory Leak

<0:4.18.0-553.5.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.5.1.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • M
Out-of-Bounds

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Use After Free

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Read

<0:4.18.0-553.el8_10
  • M
Out-of-bounds Write

<0:4.18.0-553.el8_10
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
Integer Underflow

<0:4.18.0-513.24.1.el8_9
  • H
Out-of-bounds Write

<0:4.18.0-513.24.1.el8_9
  • H
Race Condition

<0:4.18.0-513.24.1.el8_9
  • H
Use After Free

<0:4.18.0-513.24.1.el8_9
  • H
NULL Pointer Dereference

<0:4.18.0-513.24.1.el8_9
  • H
Integer Overflow or Wraparound

<0:4.18.0-513.24.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Incorrect Calculation

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Race Condition

<0:4.18.0-513.9.1.el8_9
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Use After Free

<0:4.18.0-477.21.1.el8_8
  • H
Incorrect Authorization

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Use After Free

<0:4.18.0-477.27.1.el8_8
  • H
CVE-2023-20593

<0:4.18.0-477.27.1.el8_8
  • M
NULL Pointer Dereference

<0:4.18.0-477.15.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
Out-of-bounds Write

<0:4.18.0-477.27.1.el8_8
  • H
CVE-2023-0386

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-425.19.2.el8_7
  • H
Deadlock

<0:4.18.0-425.19.2.el8_7
  • H
Out-of-bounds Write

<0:4.18.0-425.19.2.el8_7
  • H
Use After Free

<0:4.18.0-425.13.1.el8_7
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-425.13.1.el8_7
  • H
Use After Free

<0:4.18.0-305.3.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.3.1.el8_4
  • H
Integer Overflow or Wraparound

<0:4.18.0-305.10.2.el8_4
  • H
Race Condition

<0:4.18.0-305.10.2.el8_4
  • H
Use After Free

<0:4.18.0-305.7.1.el8_4
  • H
CVE-2020-26541

<0:4.18.0-305.7.1.el8_4
  • H
Race Condition

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-305.12.1.el8_4
  • H
Out-of-Bounds

<0:4.18.0-305.17.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.17.1.el8_4
  • M
Missing Authorization

<0:4.18.0-305.19.1.el8_4
  • H
Missing Authorization

<0:4.18.0-305.25.1.el8_4
  • H
Out-of-bounds Write

<0:4.18.0-305.25.1.el8_4
  • H
Use After Free

<0:4.18.0-305.25.1.el8_4
  • H
Improper Validation of Specified Quantity in Input

<0:4.18.0-348.2.1.el8_5
  • H
Improper Initialization

<0:4.18.0-348.2.1.el8_5
  • M
Race Condition

<0:4.18.0-348.7.1.el8_5
  • H
Integer Underflow

<0:4.18.0-348.12.2.el8_5
  • H
Incorrect Calculation of Buffer Size

<0:4.18.0-348.12.2.el8_5
  • H
CVE-2022-0516

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Improper Initialization

<0:4.18.0-348.20.1.el8_5
  • H
Missing Authorization

<0:4.18.0-348.20.1.el8_5
  • H
Out-of-bounds Write

<0:4.18.0-348.20.1.el8_5
  • H
Improper Preservation of Permissions

<0:4.18.0-348.20.1.el8_5
  • H
Use After Free

<0:4.18.0-348.20.1.el8_5
  • H
Race Condition

<0:4.18.0-348.20.1.el8_5
  • H
Improper Privilege Management

<0:4.18.0-348.23.1.el8_5
  • H
Use After Free

<0:4.18.0-348.23.1.el8_5
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-425.13.1.el8_7
  • H
Memory Leak

<0:4.18.0-425.10.1.el8_7
  • H
Out-of-Bounds

<0:4.18.0-425.10.1.el8_7
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • M
Incomplete Cleanup

<0:4.18.0-372.26.1.el8_6
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.16.1.el8_6
  • H
Incorrect Type Conversion or Cast

<0:4.18.0-372.9.1.el8
  • H
NULL Pointer Dereference

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0002

<0:4.18.0-372.9.1.el8
  • H
CVE-2022-0001

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-43976

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • H
CVE-2021-43056

<0:4.18.0-372.9.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.9.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • M
CVE-2022-36946

<0:4.18.0-425.3.1.el8
  • H
Improper Authentication

<0:4.18.0-372.9.1.el8
  • M
CVE-2022-29581

<0:4.18.0-425.3.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Out-of-Bounds

<0:4.18.0-372.9.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • M
Double Free

<0:4.18.0-425.3.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • H
Improper Access Control

<0:4.18.0-372.9.1.el8
  • M
Incorrect Conversion between Numeric Types

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
CVE-2022-26373

<0:4.18.0-425.3.1.el8
  • H
CVE-2021-3773

<0:4.18.0-372.9.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Improper Validation of Integrity Check Value

<0:4.18.0-372.9.1.el8
  • M
Improper Handling of Exceptional Conditions

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
CVE-2022-23960

<0:4.18.0-425.3.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • M
Out-of-bounds Write

<0:4.18.0-425.3.1.el8
  • H
Race Condition

<0:4.18.0-372.9.1.el8
  • M
Stack-based Buffer Overflow

<0:4.18.0-425.3.1.el8
  • H
Memory Leak

<0:4.18.0-372.9.1.el8
  • M
CVE-2022-20368

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Double Free

<0:4.18.0-372.9.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-372.9.1.el8
  • M
Use After Free

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.9.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • H
Arbitrary Command Injection

<0:4.18.0-372.9.1.el8
  • M
Missing Initialization of Resource

<0:4.18.0-425.3.1.el8
  • H
CVE-2021-26401

<0:4.18.0-372.9.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • H
Use of Uninitialized Resource

<0:4.18.0-372.9.1.el8
  • H
Use of Insufficiently Random Values

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Read

<0:4.18.0-372.9.1.el8
  • M
NULL Pointer Dereference

<0:4.18.0-425.3.1.el8
  • H
CVE-2020-4788

<0:4.18.0-372.9.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • H
Use After Free

<0:4.18.0-372.9.1.el8
  • M
Memory Leak

<0:4.18.0-425.3.1.el8
  • H
Integer Overflow or Wraparound

<0:4.18.0-372.9.1.el8
  • M
Race Condition

<0:4.18.0-425.3.1.el8
  • H
Improper Privilege Management

<0:4.18.0-372.9.1.el8
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:4.18.0-425.3.1.el8
  • H
Out-of-bounds Write

<0:4.18.0-372.13.1.el8_6
  • H
Out-of-bounds Read

<0:4.18.0-372.13.1.el8_6
  • H
Use After Free

<0:4.18.0-372.19.1.el8_6
  • H
Memory Leak

<0:4.18.0-372.19.1.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.32.1.el8_6
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:4.18.0-372.32.1.el8_6
  • H
Double Free

<0:4.18.0-372.32.1.el8_6
  • H
Exposure of Resource to Wrong Sphere

<0:4.18.0-372.32.1.el8_6
  • H
CVE-2022-23816

<0:4.18.0-372.32.1.el8_6
  • H
CVE-2022-1353

<0:4.18.0-372.32.1.el8_6
  • H
Use of Uninitialized Resource

<0:4.18.0-372.32.1.el8_6