kernel-headers vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-headers package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
NULL Pointer Dereference

*
  • M
CVE-2021-47217

*
  • M
CVE-2021-47200

*
  • M
CVE-2021-47198

*
  • M
CVE-2021-47193

*
  • M
CVE-2021-47194

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • M
CVE-2021-47196

*
  • M
CVE-2021-47214

*
  • M
CVE-2021-47192

*
  • M
CVE-2021-47189

*
  • M
CVE-2021-47182

*
  • M
CVE-2021-47191

*
  • M
CVE-2021-47203

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2021-47219

*
  • M
CVE-2021-47183

*
  • M
Resource Leak

*
  • M
CVE-2024-26804

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-26783

*
  • M
CVE-2024-26791

*
  • M
CVE-2024-26803

*
  • M
CVE-2024-26801

*
  • M
CVE-2024-26739

*
  • M
CVE-2024-26732

*
  • M
Improper Null Termination

*
  • M
Deadlock

*
  • M
CVE-2024-26706

*
  • L
Divide By Zero

*
  • M
CVE-2024-26768

*
  • M
CVE-2024-26769

*
  • M
Improper Input Validation

*
  • M
CVE-2024-26767

*
  • M
CVE-2024-26738

*
  • L
Race Condition

*
  • M
Divide By Zero

*
  • M
Improper Input Validation

*
  • L
Improper Write Handling in Limited-write Non-Volatile Memories

*
  • M
Race Condition

*
  • M
Deadlock

*
  • M
Improper Null Termination

*
  • M
CVE-2024-26741

*
  • M
CVE-2024-26716

*
  • M
Improper Handling of Values

*
  • M
CVE-2024-26733

*
  • M
CVE-2024-26735

*
  • M
CVE-2024-26740

*
  • M
Resource Injection

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
CVE-2024-26726

*
  • M
CVE-2024-26713

*
  • M
CVE-2024-26763

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • M
Improper Handling of Values

*
  • M
CVE-2024-26776

*
  • M
Improper Input Validation

*
  • L
Race Condition

*
  • M
CVE-2024-26709

*
  • M
CVE-2024-26718

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2024-26765

*
  • L
Deadlock

*
  • L
Unchecked Input for Loop Condition

*
  • M
Race Condition

*
  • M
CVE-2024-26719

*
  • M
Race Condition

*
  • M
CVE-2024-26764

*
  • M
Improper Resource Locking

*
  • M
CVE-2024-26742

*
  • M
CVE-2024-26704

*
  • M
Resource Injection

*
  • M
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • L
Improper Locking

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • M
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • M
Improper Resource Locking

*
  • L
Resource Injection

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • M
Improper Cleanup on Thrown Exception

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • M
Resource Injection

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
CVE-2023-28746

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Missing Initialization of a Variable

*
  • M
Improper Resource Locking

*
  • L
Missing Initialization of a Variable

*
  • L
Missing Lock Check

*
  • L
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • M
Deadlock

*
  • L
Out-of-bounds Read

*
  • M
Missing Lock Check

*
  • M
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • L
Resource Leak

*
  • L
Use After Free

*
  • M
Incomplete Cleanup

*
  • L
NULL Pointer Dereference

*
  • M
Resource Injection

*
  • M
Use After Free

*
  • L
Use After Free

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Deadlock

*
  • L
Improper Input Validation

*
  • M
Double Free

*
  • M
Out-of-bounds Write

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Race Condition

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • L
Resource Leak

*
  • L
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • L
Double Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Improper Resource Locking

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Leak

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Use After Free

*
  • M
CVE-2023-52575

*
  • M
Memory Leak

*
  • M
Resource Injection

*
  • L
Missing Encryption of Sensitive Data

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
CVE-2023-52497

*
  • M
Resource Injection

*
  • L
Deadlock

*
  • L
Memory Leak

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
Memory Leak

*
  • L
Improper Input Validation

*
  • L
Improper Resource Locking

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
Return of Stack Variable Address

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • M
Resource Leak

*
  • L
Resource Exhaustion

*
  • M
Information Exposure Through Indexing of Private Data

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Improper Input Validation

*
  • L
Resource Leak

*
  • M
NULL Pointer Dereference

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Incorrect Check of Function Return Value

*
  • L
Use After Free

*
  • M
CVE-2021-47018

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
Improper Handling of Missing Values

*
  • L
Double Free

*
  • M
Improper Handling of Values

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
Resource Exhaustion

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • M
Untrusted Pointer Dereference

*
  • M
Incorrect Check of Function Return Value

*
  • M
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
Memory Leak

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Deadlock

*
  • M
Uncontrolled Memory Allocation

*
  • M
Resource Leak

*
  • L
CVE-2021-47019

*
  • L
Resource Leak

*
  • L
Use After Free

*
  • M
Deadlock

*
  • M
Resource Leak

*
  • M
Resource Leak

*
  • L
Return of Wrong Status Code

*
  • M
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Memory Leak

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • M
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Resource Leak

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Integer Underflow

*
  • L
NULL Pointer Dereference

*
  • L
Unchecked Error Condition

*
  • L
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • M
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • M
Resource Leak

*
  • L
Use After Free

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • L
Improper Input Validation

*
  • M
Resource Leak

*
  • L
CVE-2021-46922

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Missing Support for Integrity Check

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
Double Free

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • M
Resource Leak

*
  • M
Range Error

*
  • M
Out-of-bounds Read

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • M
Improper Input Validation

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
CVE-2021-46914

*
  • L
NULL Pointer Dereference

*
  • L
Memory Leak

*
  • M
Deadlock

*
  • M
Divide By Zero

*
  • M
Improper Input Validation

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
CVE-2023-52474

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52459

*
  • L
CVE-2024-26595

*
  • M
Improper Validation of Array Index

*
  • M
CVE-2023-52455

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2023-52454

*
  • M
NULL Pointer Dereference

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
Untrusted Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52462

*
  • M
CVE-2023-52463

*
  • M
CVE-2023-52456

*
  • L
CVE-2023-52461

*
  • M
CVE-2024-25744

*
  • M
Memory Leak

*
  • M
CVE-2024-25741

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Off-by-one Error

*
  • M
CVE-2024-23850

*
  • M
Out-of-Bounds

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
Improper Update of Reference Count

*
  • M
Race Condition

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Man-in-the-Middle (MitM)

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • H
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Use After Free

*
  • M
NULL Pointer Dereference

*
  • H
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Incorrect Bitwise Shift of Integer

*
  • L
Use After Free

*
  • M
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Improperly Implemented Security Check for Standard

*
  • M
Use After Free

*
  • M
Sensitive Information Uncleared Before Release

*
  • M
Incorrect Authorization

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2022-27672

*
  • M
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • M
Integer Overflow or Wraparound

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Memory Leak

*
  • M
Insecure Default Initialization of Resource

*
  • L
Memory Leak

*
  • M
Memory Leak

*
  • L
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Out-of-Bounds

*
  • M
Memory Leak

*
  • M
Memory Leak

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Race Condition

*
  • H
Use After Free

*
  • M
Improper Locking

*
  • M
Race Condition During Access to Alternate Channel

*
  • M
Race Condition

*
  • L
Expected Behavior Violation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Buffer Overflow

*
  • M
Use After Free

*
  • L
Improper Locking

*
  • M
Improper Initialization

*
  • M
Out-of-bounds Write

*
  • M
Improper Restriction of Communication Channel to Intended Endpoints

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Improper Update of Reference Count

*
  • M
Incorrect Calculation of Buffer Size

*
  • H
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Update of Reference Count

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Incorrect Default Permissions

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Double Free

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Use of Uninitialized Resource

*
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Information Exposure

*
  • M
Authentication Bypass

*
  • M
Memory Leak

*
  • M
Improper Preservation of Permissions

*
  • L
Use of Uninitialized Resource

*
  • M
Information Exposure

*
  • H
Use After Free

*
  • L
Improper Handling of Exceptional Conditions

*
  • M
Use of Insufficiently Random Values

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Race Condition

*
  • M
Memory Leak

*
  • M
Memory Leak

*
  • M
Improper Locking

*
  • L
CVE-2019-0136

*
  • M
Incomplete Cleanup

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Use of Insufficiently Random Values

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Information Exposure

*
  • M
Improper Validation of Integrity Check Value

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • L
Out-of-Bounds

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • H
Heap-based Buffer Overflow

<0:2.6.32-754.33.1.el6
  • H
Use After Free

<0:2.6.32-754.15.3.el6
  • H
Improper Initialization

<0:2.6.32-754.3.5.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-754.2.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.el6
  • H
Buffer Overflow

<0:2.6.32-754.28.1.el6
  • M
Insufficient Control of Network Message Volume (Network Amplification)

<0:2.6.32-696.el6
  • M
CVE-2014-8134

<0:2.6.32-642.el6
  • M
Execution with Unnecessary Privileges

<0:2.6.32-642.el6
  • M
NULL Pointer Dereference

<0:2.6.32-642.el6
  • H
Information Exposure

<0:2.6.32-754.18.2.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-754.22.1.el6
  • M
Out-of-Bounds

<0:2.6.32-573.el6
  • M
Access Restriction Bypass

<0:2.6.32-573.el6
  • M
CVE-2011-5321

<0:2.6.32-504.30.3.el6
  • H
Out-of-Bounds

<0:2.6.32-504.12.2.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.3.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.6.3.el6
  • H
Improper Access Control

<0:2.6.32-754.12.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.18.2.el6
  • H
Use After Free

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-754.11.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.el6
  • H
Resource Exhaustion

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.6.3.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.3.5.el6
  • H
Improper Access Control

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Information Exposure

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-754.2.1.el6
  • H
Resource Exhaustion

<0:2.6.32-754.3.5.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.3.5.el6
  • H
Incorrect Calculation

<0:2.6.32-431.29.2.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-431.29.2.el6
  • H
Information Exposure

<0:2.6.32-754.2.1.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-696.30.1.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-696.28.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
Improper Input Validation

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
Numeric Errors

<0:2.6.32-431.20.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-431.20.3.el6
  • H
Incorrect Privilege Assignment

<0:2.6.32-696.28.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.28.1.el6
  • H
Information Exposure

<0:2.6.32-696.28.1.el6
  • H
Use After Free

<0:2.6.32-754.3.5.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-696.28.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
Out-of-bounds Write

<0:2.6.32-431.17.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.17.1.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-696.28.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.11.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.11.2.el6
  • H
CVE-2014-0055

<0:2.6.32-431.11.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.11.2.el6
  • M
NULL Pointer Dereference

<0:2.6.32-754.30.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.5.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-696.23.1.el6
  • M
Buffer Overflow

<0:2.6.32-696.13.2.el6
  • M
Improper Input Validation

<0:2.6.32-696.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-696.20.1.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-696.16.1.el6
  • H
Use After Free

<0:2.6.32-696.20.1.el6
  • H
Divide By Zero

<0:2.6.32-696.16.1.el6
  • H
Information Exposure

<0:2.6.32-431.1.2.el6
  • H
Race Condition

<0:2.6.32-696.16.1.el6
  • H
Numeric Errors

<0:2.6.32-431.1.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.1.2.el6
  • H
Missing Initialization of a Variable

<0:2.6.32-431.1.2.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Stack-based Buffer Overflow

<0:2.6.32-696.10.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Improper Input Validation

<0:2.6.32-431.el6
  • H
Memory Leak

<0:2.6.32-431.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Use of Externally-Controlled Format String

<0:2.6.32-431.el6
  • H
Off-by-one Error

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-431.el6
  • H
CVE-2013-0343

<0:2.6.32-431.el6
  • M
Resource Management Errors

<0:2.6.32-358.23.2.el6
  • M
Access Restriction Bypass

<0:2.6.32-358.23.2.el6
  • H
Improper Input Validation

<0:2.6.32-358.18.1.el6
  • H
Improper Input Validation

<0:2.6.32-358.18.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.18.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-358.18.1.el6
  • H
CVE-2013-2224

<0:2.6.32-358.18.1.el6
  • H
Information Exposure

<0:2.6.32-358.18.1.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • M
Improper Input Validation

<0:2.6.32-358.14.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-358.14.1.el6
  • H
Out-of-bounds Read

<0:2.6.32-696.20.1.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • H
Out-of-Bounds

<0:2.6.32-696.10.3.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • H
Unchecked Error Condition

<0:2.6.32-754.el6
  • M
Improper Authentication

<0:2.6.32-696.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • M
Stack-based Buffer Overflow

<0:2.6.32-696.el6
  • H
Detection of Error Condition Without Action

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-754.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • M
Resource Management Errors

<0:2.6.32-358.14.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • M
Resource Management Errors

<0:2.6.32-358.14.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • M
Resource Exhaustion

<0:2.6.32-358.14.1.el6
  • M
Use of Externally-Controlled Format String

<0:2.6.32-358.14.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-358.14.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.33.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • M
Improper Authentication

<0:2.6.32-696.el6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-696.3.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-358.11.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.11.1.el6
  • H
Out-of-bounds Read

<0:2.6.32-696.6.3.el6
  • H
Race Condition

<0:2.6.32-358.11.1.el6
  • H
Resource Management Errors

<0:2.6.32-358.11.1.el6
  • H
Improper Handling of Length Parameter Inconsistency

<0:2.6.32-696.28.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.3.2.el6
  • H
CVE-2017-1000379

<0:2.6.32-696.3.2.el6
  • H
Numeric Range Comparison Without Minimum Check

<0:2.6.32-358.6.2.el6
  • H
Buffer Overflow

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-696.1.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-696.1.1.el6
  • H
Numeric Errors

<0:2.6.32-358.6.1.el6
  • H
Race Condition

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-642.13.2.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-358.6.1.el6
  • H
CVE-2013-1826

<0:2.6.32-358.6.1.el6
  • H
Improper Input Validation

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
CVE-2013-1827

<0:2.6.32-358.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.6.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Use After Free

<0:2.6.32-642.13.1.el6
  • H
Use After Free

<0:2.6.32-642.13.1.el6
  • M
Out-of-bounds Read

<0:2.6.32-642.15.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-358.2.1.el6
  • H
Numeric Errors

<0:2.6.32-358.2.1.el6
  • H
Race Condition

<0:2.6.32-358.0.1.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-642.6.1.el6
  • H
CVE-2013-0311

<0:2.6.32-358.el6
  • H
Improper Input Validation

<0:2.6.32-358.el6
  • H
NULL Pointer Dereference

<0:2.6.32-358.el6
  • H
Race Condition

<0:2.6.32-358.el6
  • H
Out-of-Bounds

<0:2.6.32-358.el6
  • M
Race Condition

<0:2.6.32-642.15.1.el6
  • M
Resource Exhaustion

<0:2.6.32-642.el6
  • M
NULL Pointer Dereference

<0:2.6.32-642.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • M
Race Condition

<0:2.6.32-696.el6
  • M
Improper Locking

<0:2.6.32-642.el6
  • M
Incorrect Privilege Assignment

<0:2.6.32-696.el6
  • H
Race Condition

<0:2.6.32-642.6.2.el6
  • M
Improper Input Validation

<0:2.6.32-279.22.1.el6
  • M
Information Exposure

<0:2.6.32-279.22.1.el6
  • M
CVE-2012-4461

<0:2.6.32-279.22.1.el6
  • M
CVE-2012-4444

<0:2.6.32-279.19.1.el6
  • M
CVE-2012-5517

<0:2.6.32-279.19.1.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-642.13.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • H
Information Exposure

<0:2.6.32-642.4.2.el6
  • H
Incorrect Check of Function Return Value

<0:2.6.32-642.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.11.1.el6
  • M
CVE-2012-1568

<0:2.6.32-279.14.1.el6
  • M
Use After Free

<0:2.6.32-279.14.1.el6
  • M
Use After Free

<0:2.6.32-279.14.1.el6
  • M
Out-of-Bounds

<0:2.6.32-279.14.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.3.1.el6
  • M
Time-of-check Time-of-use (TOCTOU)

<0:2.6.32-573.26.1.el6
  • H
Resource Exhaustion

<0:2.6.32-279.11.1.el6
  • M
Race Condition

*
  • M
Information Exposure

<0:2.6.32-279.9.1.el6
  • M
Memory Leak

<0:2.6.32-279.9.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-279.9.1.el6
  • M
Integer Overflow or Wraparound

<0:2.6.32-279.9.1.el6
  • M
Integer Overflow or Wraparound

<0:2.6.32-279.5.1.el6
  • M
Information Exposure

<0:2.6.32-279.5.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.40.1.el6
  • H
Out-of-Bounds

<0:2.6.32-279.1.1.el6
  • H
Missing Initialization of a Variable

<0:2.6.32-573.12.1.el6
  • M
Interaction Error

<0:2.6.32-573.26.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • H
Out-of-Bounds

<0:2.6.32-220.23.1.el6
  • M
Resource Exhaustion

<0:2.6.32-279.el6
  • M
Numeric Errors

<0:2.6.32-279.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-220.23.1.el6
  • H
CVE-2012-2372

<0:2.6.32-220.23.1.el6
  • H
Race Condition

<0:2.6.32-220.23.1.el6
  • H
Out-of-Bounds

<0:2.6.32-220.23.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-220.23.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • M
Out-of-Bounds

<0:2.6.32-220.17.1.el6
  • M
Resource Management Errors

<0:2.6.32-220.17.1.el6
  • M
Resource Exhaustion

<0:2.6.32-220.13.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.12.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.12.1.el6
  • M
Improper Input Validation

<0:2.6.32-220.7.1.el6
  • M
Improper Input Validation

<0:2.6.32-220.13.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.13.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-220.13.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.7.1.el6
  • M
CVE-2012-0045

<0:2.6.32-220.7.1.el6
  • M
CVE-2011-4622

<0:2.6.32-220.7.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.7.1.el6
  • M
Integer Overflow or Wraparound

<0:2.6.32-220.7.1.el6
  • M
Out-of-Bounds

<0:2.6.32-220.7.1.el6
  • M
Divide By Zero

<0:2.6.32-220.7.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-220.7.1.el6
  • M
Numeric Errors

<0:2.6.32-220.7.1.el6
  • H
Directory Traversal

<0:2.6.32-573.12.1.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • M
Improper Input Validation

<0:2.6.32-573.22.1.el6
  • M
Unchecked Error Condition

<0:2.6.32-573.el6
  • M
Improper Input Validation

<0:2.6.32-642.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.6.32-573.12.1.el6
  • H
Incorrect Authorization

<0:2.6.32-220.4.1.el6
  • H
Deadlock

<0:2.6.32-504.16.2.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • H
Information Exposure

<0:2.6.32-504.23.4.el6
  • H
CVE-2011-3188

<0:2.6.32-131.21.1.el6
  • H
Improper Access Control

<0:2.6.32-220.2.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-220.2.1.el6
  • H
Resource Management Errors

<0:2.6.32-131.21.1.el6
  • M
Heap-based Buffer Overflow

<0:2.6.32-642.el6
  • M
Information Exposure

<0:2.6.32-220.el6
  • M
CVE-2011-3347

<0:2.6.32-220.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.el6
  • M
CVE-2011-3638

<0:2.6.32-220.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
Buffer Overflow

<0:2.6.32-131.21.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
CVE-2011-2905

<0:2.6.32-131.21.1.el6
  • H
CVE-2011-2699

<0:2.6.32-131.21.1.el6
  • H
Information Exposure

<0:2.6.32-131.21.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.21.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.3.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.21.1.el6
  • H
Information Exposure

<0:2.6.32-131.21.1.el6
  • H
CVE-2014-9585

<0:2.6.32-504.23.4.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-573.3.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.17.1.el6
  • M
Use After Free

<0:2.6.32-504.30.3.el6
  • M
External Initialization of Trusted Variables or Data Stores

<0:2.6.32-504.30.3.el6
  • H
Resource Exhaustion

<0:2.6.32-131.17.1.el6
  • H
Information Exposure

<0:2.6.32-131.17.1.el6
  • H
Time-of-check Time-of-use (TOCTOU)

<0:2.6.32-131.17.1.el6
  • H
Information Exposure

<0:2.6.32-131.17.1.el6
  • H
Resource Management Errors

<0:2.6.32-131.17.1.el6
  • H
Numeric Errors

<0:2.6.32-131.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.17.1.el6
  • H
Numeric Errors

<0:2.6.32-131.17.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.17.1.el6
  • H
Numeric Errors

<0:2.6.32-131.17.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-131.12.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-131.12.1.el6
  • H
Off-by-one Error

<0:2.6.32-131.12.1.el6
  • H
Resource Exhaustion

<0:2.6.32-131.12.1.el6
  • H
Information Exposure

<0:2.6.32-131.12.1.el6
  • H
Out-of-Bounds

<0:2.6.32-131.12.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.12.1.el6
  • H
Resource Exhaustion

<0:2.6.32-131.12.1.el6
  • H
Race Condition

<0:2.6.32-131.12.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-504.23.4.el6
  • M
Return of Wrong Status Code

<0:2.6.32-504.30.3.el6
  • H
Out-of-Bounds

<0:2.6.32-131.12.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.12.1.el6
  • H
Improper Access Control

<0:2.6.32-131.12.1.el6
  • H
Use After Free

<0:2.6.32-504.16.2.el6
  • H
Code

<0:2.6.32-504.23.4.el6
  • H
Improper Input Validation

<0:2.6.32-504.16.2.el6
  • M
Memory Leak

<0:2.6.32-71.34.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.29.2.el6
  • M
Race Condition

<0:2.6.32-131.6.1.el6
  • M
Resource Management Errors

<0:2.6.32-131.6.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-131.2.1.el6
  • M
CVE-2011-1767

<0:2.6.32-131.6.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-131.2.1.el6
  • H
CVE-2011-1182

<0:2.6.32-71.31.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.31.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-131.2.1.el6
  • H
Resource Exhaustion

<0:2.6.32-131.2.1.el6
  • H
Improper Input Validation

<0:2.6.32-131.0.15.el6
  • H
NULL Pointer Dereference

<0:2.6.32-131.2.1.el6
  • H
Buffer Overflow

<0:2.6.32-71.31.1.el6
  • H
Information Exposure

<0:2.6.32-71.29.1.el6
  • H
CVE-2011-1023

<0:2.6.32-131.0.15.el6
  • H
Improper Input Validation

<0:2.6.32-71.31.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.31.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.31.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.24.1.el6
  • H
Information Exposure

<0:2.6.32-71.31.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.24.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.31.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Buffer Overflow

<0:2.6.32-71.29.1.el6
  • H
Information Exposure

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Memory Leak

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Incorrect Calculation

<0:2.6.32-71.29.1.el6
  • H
Improper Input Validation

<0:2.6.32-71.29.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-71.29.1.el6
  • H
Operation on a Resource after Expiration or Release

<0:2.6.32-71.29.1.el6
  • H
CVE-2011-1019

<0:2.6.32-71.29.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.29.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-71.29.1.el6
  • H
Buffer Overflow

<0:2.6.32-504.23.4.el6
  • H
Out-of-bounds Write

<0:2.6.32-71.24.1.el6
  • H
Improper Initialization

<0:2.6.32-71.24.1.el6
  • H
Race Condition

<0:2.6.32-71.24.1.el6
  • H
Improper Synchronization

<0:2.6.32-71.24.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.24.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.24.1.el6
  • H
Information Exposure

<0:2.6.32-71.24.1.el6
  • H
Use After Free

<0:2.6.32-504.16.2.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.12.2.el6
  • H
Information Exposure

<0:2.6.32-71.24.1.el6
  • H
CVE-2010-4648

<0:2.6.32-71.24.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.18.2.el6
  • M
Resource Exhaustion

<0:2.6.32-71.18.1.el6
  • M
Divide By Zero

<0:2.6.32-71.18.1.el6
  • M
Use After Free

<0:2.6.32-71.18.1.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Out-of-bounds Read

<0:2.6.32-504.16.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.16.2.el6
  • M
Information Exposure

<0:2.6.32-573.el6
  • H
Stack-based Buffer Overflow

<0:2.6.32-504.16.2.el6
  • H
Resource Exhaustion

<0:2.6.32-504.16.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.12.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.12.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.8.1.el6
  • H
Improper Enforcement of Behavioral Workflow

<0:2.6.32-504.3.3.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-504.3.3.el6
  • H
Link Following

<0:2.6.32-504.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Resource Exhaustion

<0:2.6.32-504.3.3.el6
  • H
Memory Leak

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.8.1.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Double Free

<0:2.6.32-71.14.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.5.1.el6
  • M
Off-by-one Error

<0:2.6.32-573.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
Out-of-Bounds

<0:2.6.32-504.1.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.14.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Race Condition

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Resource Management Errors

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
Uncaught Exception

<0:2.6.32-504.1.3.el6
  • H
Race Condition

<0:2.6.32-504.1.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.el6
  • H
Out-of-bounds Write

<0:2.6.32-71.14.1.el6
  • H
Uncaught Exception

<0:2.6.32-504.1.3.el6
  • H
Improper Input Validation

<0:2.6.32-71.14.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
Information Exposure

<0:2.6.32-71.14.1.el6
  • H
CVE-2010-4242

<0:2.6.32-71.14.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.14.1.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Missing Initialization of Resource

<0:2.6.32-71.14.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.7.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.7.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.29.2.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.7.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.7.1.el6
  • H
Off-by-one Error

<0:2.6.32-71.7.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-71.7.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-431.29.2.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.7.1.el6
  • H
Improper Handling of Syntactically Invalid Structure

<0:2.6.32-71.7.1.el6
  • H
Resource Exhaustion

<0:2.6.32-71.7.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-71.7.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
Information Exposure

<0:2.6.32-71.7.1.el6
  • H
Incorrect Conversion between Numeric Types

<0:2.6.32-71.7.1.el6
  • H
Out-of-Bounds

<0:2.6.32-71.7.1.el6
  • H
External Control of Critical State Data

<0:2.6.32-431.20.5.el6
  • H
Improper Privilege Management

<0:2.6.32-431.20.5.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-754.28.1.el6
  • M
Information Exposure

*
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.32-431.20.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-431.23.3.el6
  • H
Improper Privilege Management

<0:2.6.32-431.20.3.el6
  • H
Out-of-bounds Read

<0:2.6.32-431.23.3.el6
  • H
Information Exposure

<0:2.6.32-431.20.3.el6
  • M
Information Exposure

<0:2.6.32-754.31.1.el6
  • H
Use After Free

<0:2.6.32-431.23.3.el6
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • H
Race Condition

<0:2.6.32-358.6.1.el6
  • M
Use After Free

*
  • M
Information Exposure

*
  • H
Buffer Overflow

<0:2.6.32-754.29.1.el6
  • H
Privilege Context Switching Error

<0:2.6.32-504.16.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-696.28.1.el6
  • M
Out-of-Bounds

*
  • H
Improper Access Control

<0:2.6.32-754.24.3.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.24.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.24.2.el6
  • H
Improper Access Control

<0:2.6.32-754.24.2.el6
  • M
Out-of-Bounds

*
  • M
Use of Insufficiently Random Values

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Arbitrary Code Injection

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Memory Leak

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
Use of Uninitialized Resource

*
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

*
  • M
Out-of-bounds Write

*
  • M
Insufficient Comparison

*
  • L
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*
  • L
Use After Free

*
  • M
Incomplete Cleanup

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Write

*
  • L
Out-of-Bounds

*
  • M
Expected Behavior Violation

*
  • M
Improper Locking

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Resource Exhaustion

*
  • M
Race Condition

*
  • M
Use After Free

*
  • M
Use After Free

*
  • H
Use After Free

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • M
Execution with Unnecessary Privileges

*
  • M
Resource Exhaustion

*
  • M
Buffer Overflow

*
  • M
Stack-based Buffer Overflow

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Use After Free

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Null Byte Interaction Error (Poison Null Byte)

*
  • H
Resource Injection

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Exhaustion

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Out-of-Bounds

*
  • M
Integer Overflow or Wraparound

<0:2.6.32-504.30.3.el6
  • M
Out-of-bounds Write

*
  • M
Incorrect Check of Function Return Value

*
  • L
Out-of-bounds Write

*
  • L
Improper Cleanup on Thrown Exception

*
  • M
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • L
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • L
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Unchecked Error Condition

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • H
Out-of-bounds Write

<0:2.6.32-754.25.1.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-754.24.2.el6
  • L
Out-of-bounds Read

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • H
Information Exposure

<0:2.6.32-754.18.2.el6
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • M
Missing Initialization of a Variable

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-Bounds

*
  • H
Buffer Overflow

<0:2.6.32-754.23.1.el6
  • M
Heap-based Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • H
Covert Timing Channel

<0:2.6.32-754.18.2.el6
  • L
Information Exposure

*
  • H
NULL Pointer Dereference

<0:2.6.32-754.22.1.el6
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • M
Reachable Assertion

*
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.15.3.el6
  • M
NULL Pointer Dereference

*
  • H
Resource Exhaustion

<0:2.6.32-754.15.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.15.3.el6
  • L
Improper Input Validation

*
  • L
Integer Overflow or Wraparound

*
  • L
Numeric Range Comparison Without Minimum Check

*
  • M
Missing Authorization

*
  • M
Out-of-bounds Write

*
  • L
Divide By Zero

*
  • M
Improper Authentication

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • L
Deadlock

*
  • L
Information Exposure

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.14.2.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.14.2.el6
  • H
Sensitive Information Uncleared Before Release

<0:2.6.32-754.14.2.el6
  • L
Out-of-bounds Read

*
  • L
Improper Access Control

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Error Handling

*
  • L
Out-of-bounds Read

*
  • L
Unchecked Error Condition

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Information Exposure

*
  • L
Incorrect Authorization

*
  • L
Out-of-bounds Read

*
  • M
Use After Free

*
  • L
Incorrect Check of Function Return Value

*
  • L
Use After Free

*
  • M
Race Condition

*
  • M
Missing Initialization of Resource

*
  • M
Integer Overflow or Wraparound

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • M
Improper Initialization

*
  • M
Information Exposure

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Uncaught Exception

*
  • M
Arbitrary Code Injection

*
  • L
Improper Input Validation

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • M
Use After Free

*
  • H
Improper Input Validation

<0:2.6.32-754.29.1.el6
  • L
Improper Input Validation

*
  • L
Out-of-bounds Write

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Buffer Overflow

*
  • H
Out-of-bounds Write

*
  • M
Directory Traversal

*
  • L
Out-of-bounds Read

*
  • M
Improper Locking

*
  • L
Information Exposure

*
  • M
Out-of-Bounds

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Heap-based Buffer Overflow

*
  • M
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Improper Initialization

*
  • L
Improper Initialization

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Predictable from Observable State

*
  • L
Improper Initialization

*
  • L
Use After Free

*
  • L
Untrusted Pointer Dereference

*
  • H
Race Condition

*
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

*
  • M
Missing XML Validation

*
  • M
Resource Exhaustion

*
  • L
Information Exposure

*
  • M
Use After Free

*
  • L
Improper Initialization

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Execution with Unnecessary Privileges

*
  • M
Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Authorization

*
  • L
Improper Locking

*
  • M
Race Condition

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Race Condition

*
  • M
Missing Authorization

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • H
Stack-based Buffer Overflow

<0:2.6.32-642.11.1.el6
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Restriction of Excessive Authentication Attempts

*
  • M
Buffer Overflow

*
  • M
Improper Restriction of Excessive Authentication Attempts

*
  • L
Improper Restriction of Excessive Authentication Attempts

*
  • L
NULL Pointer Dereference

*
  • M
Authentication Bypass

*
  • M
Origin Validation Error

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Origin Validation Error

*
  • M
Origin Validation Error

*
  • M
Inclusion of Functionality from Untrusted Control Sphere

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Insufficient Verification of Data Authenticity

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Security Features

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • L
Out-of-bounds Write

*
  • M
Use After Free

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Unchecked Error Condition

*
  • L
NULL Pointer Dereference

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Code

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
NULL Pointer Dereference

*
  • M
Authentication Bypass

*
  • M
Divide By Zero

*
  • L
Improper Initialization

*
  • M
Integer Overflow or Wraparound

*
  • M
Authentication Bypass by Primary Weakness

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Information Exposure

*
  • L
Missing Release of Resource after Effective Lifetime

*
  • L
Race Condition

*
  • M
Out-of-bounds Write

*
  • M
Uncaught Exception

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • L
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • L
Covert Timing Channel

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Resource Exhaustion

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • L
Out-of-Bounds

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Improper Enforcement of Behavioral Workflow

*
  • L
Files or Directories Accessible to External Parties

*
  • M
Resource Exhaustion

*
  • M
CVE-2012-3375

*
  • L
Security Features

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
Heap-based Buffer Overflow

*
  • M
Information Exposure

*
  • M
Heap-based Buffer Overflow

*
  • M
Race Condition

*
  • L
Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Resource Management Errors

*
  • M
Resource Exhaustion

*
  • L
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • L
Missing Initialization of a Variable

*
  • L
Information Exposure

*
  • M
Improper Privilege Management

*
  • M
Access Restriction Bypass

*
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
Information Exposure

<0:2.6.32-431.11.2.el6
  • M
Information Exposure

*
  • L
Use After Free

*
  • L
Out-of-Bounds

*
  • M
Race Condition

*
  • M
Cryptographic Issues

*
  • M
Resource Exhaustion

*
  • H
Access Restriction Bypass

<0:2.6.32-358.el6