kernel-debug-modules-core vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-debug-modules-core package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Initialization

<0:5.14.0-427.42.1.el9_4
  • M
Memory Leak

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41014

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41013

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41005

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40998

<0:5.14.0-427.42.1.el9_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-427.42.1.el9_4
  • M
Improper Locking

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40972

<0:5.14.0-427.42.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40931

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40904

<0:5.14.0-427.42.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-36244

<0:5.14.0-427.42.1.el9_4
  • M
Use After Free

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26935

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26923

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26826

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26640

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-2201

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2021-47383

<0:5.14.0-427.42.1.el9_4
  • M
Improper Check for Unusual or Exceptional Conditions

<0:5.14.0-427.40.1.el9_4
  • M
Use of Uninitialized Resource

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39502

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39483

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-38556

<0:5.14.0-427.40.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-36889

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-35989

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-27403

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-52658

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-28746

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
Integer Overflow or Wraparound

<0:5.14.0-427.35.1.el9_4
  • M
Divide By Zero

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-42096

<0:5.14.0-427.35.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.35.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • M
Double Free

<0:5.14.0-427.35.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-41044

<0:5.14.0-427.35.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-40936

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-40927

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-38619

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-38559

<0:5.14.0-427.35.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-36883

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-36019

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-36000

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-35875

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-35797

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-35791

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26946

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26886

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26720

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26630

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26629

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2023-52801

<0:5.14.0-427.35.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-40928

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38575

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38558

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38391

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-37356

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-37353

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36941

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36929

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36922

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36921

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36903

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36020

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36017

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36005

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35969

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35937

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35911

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35899

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35852

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35848

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35845

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35823

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35800

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35789

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-33621

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27434

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27417

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27065

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27052

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26897

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26868

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26853

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26828

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26808

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-21823

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-52864

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-52651

<0:5.14.0-427.31.1.el9_4
  • H
Divide By Zero

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-38580

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-36952

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-36924

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-35907

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-35885

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-35857

<0:5.14.0-427.28.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • M
Race Condition

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26982

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26880

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26852

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26773

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26737

<0:5.14.0-427.28.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2021-47459

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-38663

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-38593

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-38586

<0:5.14.0-427.26.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-36957

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-36904

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-36886

<0:5.14.0-427.26.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-35958

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-27435

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-27397

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26858

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26783

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2023-52638

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2022-48627

<0:5.14.0-427.26.1.el9_4
  • H
Use After Free

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2021-47548

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-35960

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-35870

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-27393

<0:5.14.0-427.24.1.el9_4
  • M
Time-of-check Time-of-use (TOCTOU)

<0:5.14.0-427.24.1.el9_4
  • M
Use After Free

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2023-52667

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2023-52626

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2021-47400

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-26993

<0:5.14.0-427.20.1.el9_4
  • M
CVE-2024-26735

<0:5.14.0-427.20.1.el9_4
  • M
CVE-2024-25743

<0:5.14.0-427.16.1.el9_4
  • M
CVE-2024-25742

<0:5.14.0-427.16.1.el9_4
  • M
Information Exposure

<0:5.14.0-427.16.1.el9_4