kernel-doc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-doc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

<0:4.9.93-41.60.amzn1
  • M
NULL Pointer Dereference

<0:4.9.93-41.60.amzn1
  • M
CVE-2017-18232

<0:4.9.93-41.60.amzn1
  • H
Out-of-bounds Write

<0:4.9.85-38.58.amzn1
  • H
Information Exposure

<0:4.9.81-35.56.amzn1
  • H
Information Exposure

<0:4.9.81-35.56.amzn1
  • H
Improper Privilege Management

<0:4.9.81-35.56.amzn1
  • H
Race Condition

<0:4.9.81-35.56.amzn1
  • H
Race Condition

<0:4.9.81-35.56.amzn1
  • H
Out-of-bounds Read

<0:4.9.81-35.56.amzn1
  • H
Out-of-bounds Read

<0:4.9.77-31.58.amzn1
  • H
Missing Authorization

<0:4.9.77-31.58.amzn1
  • H
Use After Free

<0:4.9.77-31.58.amzn1
  • H
Race Condition

<0:4.9.77-31.58.amzn1
  • H
Missing Authorization

<0:4.9.77-31.58.amzn1
  • H
Information Exposure

<0:4.9.70-22.55.amzn1
  • C
Information Exposure

<0:4.9.76-3.78.amzn1
  • H
NULL Pointer Dereference

<0:4.9.70-22.55.amzn1
  • H
NULL Pointer Dereference

<0:4.9.70-22.55.amzn1
  • H
Divide By Zero

<0:4.9.70-22.55.amzn1
  • H
Out-of-bounds Read

<0:4.9.70-22.55.amzn1
  • H
Use After Free

<0:4.9.70-22.55.amzn1
  • C
Information Exposure

<0:4.9.76-3.78.amzn1
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.9.70-22.55.amzn1
  • H
Divide By Zero

<0:4.9.70-22.55.amzn1
  • H
Use After Free

<0:4.9.70-22.55.amzn1
  • H
Out-of-bounds Read

<0:4.9.70-22.55.amzn1
  • H
Race Condition

<0:4.9.70-22.55.amzn1
  • M
Improper Input Validation

<0:4.9.62-21.56.amzn1
  • M
NULL Pointer Dereference

<0:4.9.62-21.56.amzn1
  • M
Missing Release of Resource after Effective Lifetime

<0:4.9.62-21.56.amzn1
  • M
NULL Pointer Dereference

<0:4.9.62-21.56.amzn1
  • M
Out-of-bounds Write

<0:4.9.62-21.56.amzn1
  • H
NULL Pointer Dereference

<0:4.9.58-18.51.amzn1
  • H
Information Exposure

<0:4.9.58-18.51.amzn1
  • H
CVE-2017-12154

<0:4.9.58-18.51.amzn1
  • H
NULL Pointer Dereference

<0:4.9.58-18.51.amzn1
  • H
NULL Pointer Dereference

<0:4.9.58-18.51.amzn1
  • H
Out-of-bounds Write

<0:4.9.58-18.51.amzn1
  • M
Out-of-bounds Read

<0:4.9.51-10.52.amzn1
  • M
Out-of-Bounds

<0:4.9.51-10.52.amzn1
  • M
Incorrect Calculation

<0:4.9.43-17.39.amzn1
  • H
Buffer Overflow

<0:4.9.43-17.38.amzn1
  • H
Out-of-bounds Read

<0:4.9.43-17.38.amzn1
  • H
Integer Overflow or Wraparound

<0:4.9.43-17.38.amzn1
  • H
Race Condition

<0:4.9.43-17.38.amzn1
  • C
Out-of-bounds Write

<0:4.9.38-16.35.amzn1
  • C
Race Condition

<0:4.9.38-16.35.amzn1
  • C
Use After Free

<0:4.9.38-16.35.amzn1
  • M
CVE-2017-9076

<0:4.9.32-15.41.amzn1
  • M
Improper Input Validation

<0:4.9.32-15.41.amzn1
  • M
CVE-2017-9077

<0:4.9.32-15.41.amzn1
  • M
Out-of-bounds Read

<0:4.9.32-15.41.amzn1
  • M
Improper Resource Shutdown or Release

<0:4.9.32-15.41.amzn1
  • C
Out-of-Bounds

<0:4.9.27-14.33.amzn1
  • M
Double Free

<0:4.9.32-15.41.amzn1
  • M
CVE-2017-9075

<0:4.9.32-15.41.amzn1
  • C
CVE-2017-1000371

<0:4.9.27-14.33.amzn1
  • H
Improperly Implemented Security Check for Standard

<0:4.9.17-8.31.amzn1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.9.27-14.31.amzn1
  • H
Error Handling

<0:4.9.27-14.31.amzn1
  • H
Out-of-Bounds

<0:4.9.27-14.31.amzn1
  • H
Out-of-Bounds

<0:4.9.27-14.31.amzn1
  • H
Information Exposure

<0:4.9.27-14.31.amzn1
  • H
CVE-2017-2671

<0:4.9.27-14.31.amzn1
  • M
Race Condition

<0:4.9.20-10.30.amzn1
  • M
CVE-2017-5669

<0:4.9.20-10.30.amzn1
  • M
Double Free

<0:4.9.20-10.30.amzn1
  • H
CVE-2017-7184

<0:4.4.51-40.60.amzn1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.4.51-40.58.amzn1
  • H
Out-of-bounds Read

<0:4.4.51-40.60.amzn1
  • H
Double Free

<0:4.4.51-40.58.amzn1
  • H
NULL Pointer Dereference

<0:4.4.51-40.58.amzn1
  • H
Race Condition

<0:4.4.51-40.58.amzn1
  • H
CVE-2017-5551

<0:4.4.51-40.58.amzn1
  • H
Out-of-bounds Read

<0:4.4.51-40.58.amzn1
  • H
Improper Authorization

<0:4.4.51-40.58.amzn1
  • M
NULL Pointer Dereference

<0:4.4.39-34.54.amzn1
  • M
Use After Free

<0:4.4.41-36.55.amzn1
  • M
Out-of-Bounds

<0:4.4.39-34.54.amzn1
  • M
Improper Input Validation

<0:4.4.39-34.54.amzn1
  • M
Use After Free

<0:4.4.39-34.54.amzn1
  • M
NULL Pointer Dereference

<0:4.4.39-34.54.amzn1
  • H
Integer Overflow or Wraparound

<0:4.4.35-33.55.amzn1
  • H
Race Condition

<0:4.4.35-33.55.amzn1
  • H
Out-of-Bounds

<0:4.4.35-33.55.amzn1
  • H
Improper Access Control

<0:4.4.35-33.55.amzn1
  • H
Uncontrolled Recursion

<0:4.4.30-32.54.amzn1
  • H
Uncontrolled Recursion

<0:4.4.30-32.54.amzn1
  • C
Race Condition

<0:4.4.23-31.54.amzn1
  • M
Use After Free

<0:4.4.19-29.55.amzn1
  • M
Information Exposure

<0:4.4.15-25.57.amzn1
  • M
Information Exposure

<0:4.4.15-25.57.amzn1
  • M
CVE-2016-4470

<0:4.4.15-25.57.amzn1
  • M
Improper Access Control

<0:4.4.15-25.57.amzn1
  • M
Information Exposure

<0:4.4.15-25.57.amzn1
  • M
Out-of-Bounds

<0:4.4.14-24.50.amzn1
  • M
NULL Pointer Dereference

<0:4.4.14-24.50.amzn1
  • M
Use After Free

<0:4.4.14-24.50.amzn1
  • M
Access Restriction Bypass

<0:4.4.14-24.50.amzn1
  • L
Information Exposure

<0:4.4.11-23.53.amzn1
  • M
CVE-2016-4581

<0:4.4.10-22.54.amzn1
  • M
Access Restriction Bypass

<0:4.4.10-22.54.amzn1
  • M
CVE-2016-4557

<0:4.4.10-22.54.amzn1
  • M
CVE-2016-4558

<0:4.4.10-22.54.amzn1
  • M
Information Exposure

<0:4.4.10-22.54.amzn1
  • M
CVE-2016-0758

<0:4.4.10-22.54.amzn1
  • M
Race Condition

<0:4.4.10-22.54.amzn1
  • M
Improper Input Validation

<0:4.4.10-22.54.amzn1
  • M
Information Exposure

<0:4.4.10-22.54.amzn1
  • M
Resource Management Errors

<0:4.4.8-20.46.amzn1
  • M
Security Features

<0:4.4.8-20.46.amzn1
  • M
Improper Data Handling

<0:4.4.8-20.46.amzn1
  • M
Numeric Errors

<0:4.4.8-20.46.amzn1
  • M
Out-of-Bounds

<0:4.4.8-20.46.amzn1
  • M
Access Restriction Bypass

<0:4.1.19-24.31.amzn1
  • M
Information Exposure

<0:4.1.19-24.31.amzn1
  • M
Resource Management Errors

<0:4.1.19-24.31.amzn1
  • M
Resource Management Errors

<0:4.1.19-24.31.amzn1
  • M
Race Condition

<0:4.1.17-22.30.amzn1
  • M
Out-of-Bounds

<0:4.1.17-22.30.amzn1
  • M
Information Exposure

<0:4.1.17-22.30.amzn1
  • M
Access Restriction Bypass

<0:4.1.17-22.30.amzn1
  • M
CVE-2016-0728

<0:4.1.13-19.31.amzn1
  • M
Improper Input Validation

<0:4.1.13-18.26.amzn1
  • M
CVE-2015-8787

<0:4.1.10-17.31.amzn1
  • M
Out-of-Bounds

<0:4.1.10-17.31.amzn1
  • M
Race Condition

<0:4.1.10-17.31.amzn1
  • M
Security Features

<0:4.1.10-17.31.amzn1
  • M
Resource Management Errors

<0:3.14.48-33.39.amzn1
  • M
Resource Management Errors

<0:3.14.48-33.39.amzn1
  • M
Race Condition

<0:3.14.48-33.39.amzn1
  • M
Code

<0:3.14.48-33.39.amzn1
  • M
Access Restriction Bypass

<0:3.14.44-32.39.amzn1
  • M
CVE-2015-3636

<0:3.14.42-31.38.amzn1
  • M
Out-of-Bounds

<0:3.14.42-31.38.amzn1
  • M
Improper Data Handling

<0:3.14.34-27.48.amzn1
  • L
Access Restriction Bypass

<0:3.14.35-28.38.amzn1
  • M
Access Restriction Bypass

<0:3.14.33-26.47.amzn1
  • M
Access Restriction Bypass

<0:3.14.33-26.47.amzn1
  • M
Improper Privilege Management

<0:3.14.26-24.46.amzn1
  • M
Resource Exhaustion

<0:3.14.26-24.46.amzn1
  • M
Code

<0:3.14.26-24.46.amzn1
  • M
Resource Management Errors

<0:3.14.26-24.46.amzn1
  • M
Improper Privilege Management

<0:3.14.19-17.43.amzn1
  • M
Improper Privilege Management

<0:3.14.19-17.43.amzn1
  • M
Improper Privilege Management

<0:3.10.53-56.140.amzn1
  • M
Race Condition

<0:3.10.53-56.140.amzn1
  • M
Information Exposure

<0:3.10.53-56.140.amzn1
  • M
Integer Overflow or Wraparound

<0:3.10.48-55.140.amzn1
  • M
Numeric Errors

<0:3.10.48-55.140.amzn1
  • M
Access Restriction Bypass

<0:3.10.48-55.140.amzn1
  • M
CVE-2014-0206

<0:3.10.48-55.140.amzn1
  • M
Improper Privilege Management

<0:3.10.42-52.145.amzn1
  • M
Race Condition

<0:3.10.40-50.136.amzn1
  • M
Out-of-Bounds

<0:3.10.37-47.135.amzn1
  • M
CVE-2014-0055

<0:3.10.37-47.135.amzn1
  • M
Improper Input Validation

<0:3.10.37-47.135.amzn1
  • M
Out-of-bounds Write

<0:3.10.37-47.135.amzn1
  • L
NULL Pointer Dereference

<0:3.10.34-37.137.amzn1
  • M
Improper Input Validation

<0:3.4.82-69.112.amzn1
  • M
Out-of-Bounds

<0:3.4.82-69.112.amzn1
  • M
Improper Input Validation

<0:3.4.82-69.112.amzn1
  • M
Improper Input Validation

<0:3.4.82-69.112.amzn1
  • L
Out-of-Bounds

<0:3.4.73-64.112.amzn1
  • M
Access Restriction Bypass

<0:3.4.71-63.98.amzn1
  • M
Resource Management Errors

<0:3.4.71-63.98.amzn1
  • M
Access Restriction Bypass

<0:3.4.66-55.43.amzn1
  • M
Resource Management Errors

<0:3.4.66-55.43.amzn1
  • M
Resource Management Errors

<0:3.4.66-55.43.amzn1
  • M
Out-of-Bounds

<0:3.4.66-55.43.amzn1
  • M
Improper Input Validation

<0:3.4.66-55.43.amzn1
  • M
CVE-2013-0343

<0:3.4.62-53.42.amzn1
  • M
CVE-2013-3301

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Use of Externally-Controlled Format String

<0:3.4.57-48.42.amzn1
  • M
Resource Management Errors

<0:3.4.57-48.42.amzn1
  • M
Out-of-Bounds

<0:3.4.57-48.42.amzn1
  • M
Resource Management Errors

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Improper Input Validation

<0:3.4.57-48.42.amzn1
  • M
Resource Exhaustion

<0:3.4.57-48.42.amzn1
  • M
Access Restriction Bypass

<0:3.4.57-48.42.amzn1
  • M
CVE-2013-1059

<0:3.4.57-48.42.amzn1
  • M
Improper Input Validation

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.57-48.42.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Out-of-Bounds

<0:3.4.48-45.46.amzn1
  • M
Out-of-Bounds

<0:3.4.48-45.46.amzn1
  • M
Access Restriction Bypass

<0:3.4.48-45.46.amzn1
  • M
Resource Management Errors

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Information Exposure

<0:3.4.48-45.46.amzn1
  • M
Numeric Errors

<0:3.4.43-43.43.amzn1
  • M
Race Condition

<0:3.2.39-6.88.amzn1
  • M
CVE-2012-4461

<0:3.2.39-6.88.amzn1
  • M
Improper Input Validation

<0:3.2.39-6.88.amzn1
  • M
Information Exposure

<0:3.2.39-6.88.amzn1
  • M
Improper Input Validation

<0:3.2.37-2.47.amzn1
  • M
CVE-2012-5517

<0:3.2.36-1.46.amzn1
  • M
CVE-2012-4444

<0:3.2.36-1.46.amzn1
  • M
Numeric Errors

<0:3.2.36-1.46.amzn1
  • M
Numeric Errors

<0:3.2.36-1.46.amzn1
  • M
Numeric Errors

<0:3.2.36-1.46.amzn1
  • M
Race Condition

<0:3.2.34-55.46.amzn1
  • M
Race Condition

<0:3.2.34-55.46.amzn1
  • M
Out-of-Bounds

<0:3.2.34-55.46.amzn1
  • M
Numeric Errors

<0:3.2.34-55.46.amzn1
  • M
Resource Management Errors

<0:3.2.34-55.46.amzn1
  • M
Configuration

<0:3.2.34-55.46.amzn1
  • M
CVE-2012-1568

<0:3.2.34-55.46.amzn1
  • M
Race Condition

<0:3.2.30-49.59.amzn1
  • M
Information Exposure

<0:3.2.30-49.59.amzn1
  • M
Numeric Errors

<0:3.2.30-49.59.amzn1
  • M
Resource Management Errors

<0:3.2.30-49.59.amzn1
  • M
Access Restriction Bypass

<0:3.2.30-49.59.amzn1
  • M
Information Exposure

<0:3.2.28-45.62.amzn1
  • M
Improper Authentication

<0:3.2.28-45.63.amzn1
  • M
Numeric Errors

<0:3.2.22-35.60.amzn1
  • M
Resource Exhaustion

<0:3.2.22-35.60.amzn1
  • M
CVE-2012-2372

<0:3.2.22-35.60.amzn1
  • M
Improper Input Validation

<0:3.2.19-1.28.6.amzn1
  • L
Access Restriction Bypass

<0:3.2.18-1.26.6.amzn1
  • M
CVE-2012-1568

<0:3.2.12-3.2.4.amzn1
  • M
Divide By Zero

<0:2.6.35.14-107.1.39.amzn1
  • M
CVE-2012-0045

<0:2.6.35.14-107.1.39.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-107.1.39.amzn1
  • M
NULL Pointer Dereference

<0:2.6.35.14-107.1.39.amzn1
  • M
CVE-2011-4622

<0:2.6.35.14-107.1.39.amzn1
  • M
Integer Overflow or Wraparound

<0:2.6.35.14-107.1.39.amzn1
  • M
Access Restriction Bypass

<0:2.6.35.14-107.1.39.amzn1
  • M
Numeric Errors

<0:2.6.35.14-107.1.39.amzn1
  • M
NULL Pointer Dereference

<0:2.6.35.14-107.1.39.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-107.1.39.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-107.1.36.amzn1
  • M
Access Restriction Bypass

<0:2.6.35.14-106.53.amzn1
  • M
Resource Management Errors

<0:2.6.35.14-106.49.amzn1
  • M
Access Restriction Bypass

<0:2.6.35.14-106.49.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-106.49.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-106.49.amzn1
  • M
Resource Management Errors

<0:2.6.35.14-106.49.amzn1
  • M
CVE-2011-2699

<0:2.6.35.14-106.49.amzn1
  • M
CVE-2011-3188

<0:2.6.35.14-106.49.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-106.49.amzn1
  • M
Buffer Overflow

<0:2.6.35.14-106.49.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-106.49.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-106.49.amzn1
  • M
Information Exposure

<0:2.6.35.14-106.49.amzn1
  • M
CVE-2011-2905

<0:2.6.35.14-106.49.amzn1
  • M
Information Exposure

<0:2.6.35.14-106.49.amzn1
  • M
Resource Exhaustion

<0:2.6.35.14-103.47.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-103.47.amzn1
  • M
NULL Pointer Dereference

<0:2.6.35.14-103.47.amzn1
  • M
Resource Exhaustion

<0:2.6.35.14-97.44.amzn1
  • M
Out-of-Bounds

<0:2.6.35.14-97.44.amzn1
  • M
Improper Input Validation

<0:2.6.35.14-97.44.amzn1
  • M
Time-of-check Time-of-use (TOCTOU)

<0:2.6.35.14-97.44.amzn1
  • M
CVE-2011-3188

<0:2.6.35.14-97.44.amzn1