kernel-headers vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-headers package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2010-2010

<0:2.6.18-194.17.1.0.2.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.13.el5
  • H
CVE-2019-11091

<0:2.6.18-419.0.0.0.14.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.14.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.13.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.12.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.12.el5
  • H
Race Condition

<0:2.6.18-419.0.0.0.11.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.8.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.10.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.8.el5
  • H
Divide By Zero

<0:2.6.18-419.0.0.0.12.el5
  • H
Out-of-Bounds

<0:2.6.18-419.0.0.0.5.el5
  • H
Out-of-Bounds

<0:2.6.18-419.0.0.0.3.el5
  • H
Out-of-Bounds

<0:2.6.18-419.0.0.0.2.el5
  • H
NULL Pointer Dereference

<0:2.6.18-419.el5
  • H
Double Free

<0:2.6.18-419.el5
  • H
Improper Data Handling

<0:2.6.18-417.el5
  • H
Race Condition

<0:2.6.18-416.el5
  • H
Out-of-Bounds

<0:2.6.18-416.el5
  • H
Access Restriction Bypass

<0:2.6.18-409.el5
  • H
Resource Management Errors

<0:2.6.18-408.0.0.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-408.0.0.0.1.el5
  • H
Code

<0:2.6.18-406.0.0.0.1.el5
  • H
Code

<0:2.6.18-404.0.0.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-404.0.0.0.1.el5
  • M
Access Restriction Bypass

<0:2.6.18-402.el5
  • H
Improper Privilege Management

<0:2.6.18-400.1.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.18-409.0.0.0.1.el5
  • M
Information Exposure

<0:2.6.18-371.12.1.0.1.el5
  • M
Access Restriction Bypass

<0:2.6.18-400.0.0.0.1.el5
  • M
NULL Pointer Dereference

<0:2.6.18-371.11.1.0.1.el5
  • M
Out-of-Bounds

<0:2.6.18-371.11.1.0.1.el5
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.18-371.9.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-371.9.1.el5
  • H
Information Exposure

<0:2.6.18-371.9.1.el5
  • M
Resource Exhaustion

<0:2.6.18-371.8.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-371.6.1.el5
  • H
Numeric Errors

<0:2.6.18-371.6.1.el5
  • H
Resource Management Errors

<0:2.6.18-371.6.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-371.6.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-371.6.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-371.6.1.el5
  • H
Out-of-Bounds

<0:2.6.18-371.6.1.0.1.el5
  • M
Improper Input Validation

<0:2.6.18-371.4.1.el5
  • M
Information Exposure

<0:2.6.18-371.3.1.el5
  • M
Improper Input Validation

<0:2.6.18-371.8.1.el5
  • M
Information Exposure

<0:2.6.18-371.1.2.0.1.el5
  • M
CVE-2013-0343

<0:2.6.18-371.1.2.0.1.el5
  • M
Numeric Errors

<0:2.6.18-371.1.2.el5
  • M
Information Exposure

<0:2.6.18-371.1.2.el5
  • M
Resource Management Errors

<0:2.6.18-348.18.1.0.1.el5
  • M
Resource Management Errors

<0:2.6.18-348.18.1.0.1.el5
  • H
CVE-2013-2224

<0:2.6.18-348.16.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-348.16.1.el5
  • H
CVE-2013-2206

<0:2.6.18-348.16.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-348.16.1.el5
  • H
Resource Management Errors

<0:2.6.18-348.16.1.el5
  • H
Out-of-Bounds

<0:2.6.18-348.16.1.el5
  • H
Information Exposure

<0:2.6.18-348.16.1.el5
  • L
Out-of-Bounds

<0:2.6.18-348.12.1.el5
  • L
Access Restriction Bypass

<0:2.6.18-348.12.1.el5
  • L
Information Exposure

<0:2.6.18-348.12.1.el5
  • L
Information Exposure

<0:2.6.18-348.12.1.el5
  • L
Information Exposure

<0:2.6.18-348.12.1.0.1.el5
  • L
Information Exposure

<0:2.6.18-348.12.1.el5
  • L
Information Exposure

<0:2.6.18-348.12.1.0.1.el5
  • L
Information Exposure

<0:2.6.18-348.12.1.el5
  • M
CVE-2013-0153

<0:2.6.18-348.6.1.el5
  • M
Improper Input Validation

<0:2.6.18-348.4.1.el5
  • M
Information Exposure

<0:2.6.18-348.4.1.el5
  • M
Out-of-Bounds

<0:2.6.18-348.4.1.el5
  • M
Information Exposure

<0:2.6.18-348.4.1.el5
  • M
Information Exposure

<0:2.6.18-348.4.1.0.1.el5
  • M
Information Exposure

<0:2.6.18-348.4.1.el5
  • M
CVE-2013-1826

<0:2.6.18-348.4.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-348.3.1.0.1.el5
  • H
Race Condition

<0:2.6.18-348.3.1.el5
  • M
Improper Input Validation

<0:2.6.18-371.0.0.0.1.el5
  • M
CVE-2012-5515

<0:2.6.18-348.1.1.el5
  • M
CVE-2012-4444

<0:2.6.18-348.1.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-308.24.1.el5
  • H
Resource Management Errors

<0:2.6.18-308.24.1.el5
  • H
Configuration

<0:2.6.18-308.24.1.el5
  • H
Race Condition

<0:2.6.18-308.24.1.0.1.el5
  • L
Out-of-bounds Write

<0:2.6.18-348.2.1.el5
  • M
CVE-2012-1568

<0:2.6.18-348.1.1.el5
  • L
Numeric Errors

<0:2.6.18-308.20.1.0.1.el5
  • M
Race Condition

<0:2.6.18-348.18.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-308.16.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-308.16.1.el5
  • H
Resource Management Errors

<0:2.6.18-308.16.1.el5
  • H
Race Condition

<0:2.6.18-308.24.1.el5
  • H
Information Exposure

<0:2.6.18-308.16.1.el5
  • L
Access Restriction Bypass

<0:2.6.18-308.13.1.el5
  • M
CVE-2012-3375

<0:2.6.18-308.11.1.0.1.el5
  • H
CVE-2012-2372

<0:2.6.18-308.24.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-308.8.2.0.1.el5
  • H
CVE-2012-2934

<0:2.6.18-308.8.2.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-308.8.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-308.4.1.el5
  • M
Resource Exhaustion

<0:2.6.18-308.0.0.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-274.18.1.0.1.el5
  • H
Divide By Zero

<0:2.6.18-274.18.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.18.1.0.1.el5
  • H
Race Condition

<0:2.6.18-274.17.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-274.17.1.0.1.el5
  • H
CVE-2011-4324

<0:2.6.18-274.17.1.0.1.el5
  • H
CVE-2011-4325

<0:2.6.18-274.17.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-274.17.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-274.17.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-274.17.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.18.1.0.1.el5
  • H
CVE-2011-3638

<0:2.6.18-274.18.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.12.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-274.12.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-274.17.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.12.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-274.12.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-274.12.1.0.1.el5
  • H
CVE-2011-3347

<0:2.6.18-274.7.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-274.7.1.0.1.el5
  • H
CVE-2011-2942

<0:2.6.18-274.7.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-274.7.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.7.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-274.7.1.0.1.el5
  • H
CVE-2011-3188

<0:2.6.18-274.7.1.0.1.el5
  • H
Buffer Overflow

<0:2.6.18-274.7.1.0.1.el5
  • H
CVE-2011-2699

<0:2.6.18-274.7.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.7.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-274.7.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-274.7.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-274.7.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-274.7.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-274.3.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-274.3.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-274.3.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-274.3.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.12.1.0.1.el5
  • H
Resource Exhaustion

<0:2.6.18-274.3.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-274.3.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-274.el5
  • H
Off-by-one Error

<0:2.6.18-274.7.1.0.1.el5
  • H
Resource Exhaustion

<0:2.6.18-274.el5
  • H
CVE-2011-1182

<0:2.6.18-238.19.1.0.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.18-238.19.1.0.1.el5
  • H
CVE-2011-1936

<0:2.6.18-238.19.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-238.19.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-238.19.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-238.19.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-238.19.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.19.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-274.el5
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.18-238.19.1.0.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.18-238.19.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.12.1.0.1.el5
  • H
CVE-2011-1763

<0:2.6.18-238.12.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-238.12.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-238.12.1.0.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.18-238.19.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-238.12.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.12.1.0.1.el5
  • H
Race Condition

<0:2.6.18-238.19.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-238.12.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.12.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-238.12.1.0.1.el5
  • H
Incorrect Calculation

<0:2.6.18-238.19.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-238.12.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-238.12.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-238.12.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-238.12.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.12.1.0.1.el5
  • H
Missing Initialization of Resource

<0:2.6.18-238.19.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.19.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.9.1.0.1.el5
  • H
Buffer Overflow

<0:2.6.18-238.9.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-238.9.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-238.9.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-238.9.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-238.9.1.0.1.el5
  • M
Improper Initialization

<0:2.6.18-238.5.1.0.1.el5
  • M
Resource Exhaustion

<0:2.6.18-238.5.1.0.1.el5
  • M
Resource Exhaustion

<0:2.6.18-238.5.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-238.el5
  • H
Resource Exhaustion

<0:2.6.18-238.el5
  • H
Race Condition

<0:2.6.18-238.1.1.0.1.el5
  • H
Missing Initialization of Resource

<0:2.6.18-238.el5
  • H
Improper Initialization

<0:2.6.18-238.el5
  • H
NULL Pointer Dereference

<0:2.6.18-238.el5
  • H
Information Exposure

<0:2.6.18-238.el5
  • H
CVE-2010-4255

<0:2.6.18-238.el5
  • H
Information Exposure

<0:2.6.18-238.el5
  • H
Missing Initialization of Resource

<0:2.6.18-238.el5
  • H
Information Exposure

<0:2.6.18-238.el5
  • M
Resource Exhaustion

<0:2.6.18-238.5.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-238.el5
  • H
Information Exposure

<0:2.6.18-238.el5
  • H
Information Exposure

<0:2.6.18-238.el5
  • H
Integer Overflow or Wraparound

<0:2.6.18-194.32.1.0.1.el5
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.18-194.32.1.0.1.el5
  • H
Race Condition

<0:2.6.18-194.32.1.0.1.el5
  • H
Missing Initialization of Resource

<0:2.6.18-194.32.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-194.32.1.0.1.el5
  • H
Missing Initialization of Resource

<0:2.6.18-194.32.1.0.1.el5
  • H
CVE-2010-4242

<0:2.6.18-194.32.1.0.1.el5
  • H
Resource Exhaustion

<0:2.6.18-194.32.1.0.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.18-194.32.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-194.32.1.0.1.el5
  • H
Resource Exhaustion

<0:2.6.32-100.24.1.el5
  • H
Out-of-bounds Write

<0:2.6.18-194.32.1.0.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.32-100.24.1.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.24.1.el5
  • H
Improper Input Validation

<0:2.6.18-194.32.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.32-100.24.1.el5
  • H
Off-by-one Error

<0:2.6.32-100.24.1.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.24.1.el5
  • H
Improper Input Validation

<0:2.6.32-100.24.1.el5
  • H
Improper Input Validation

<0:2.6.18-194.32.1.0.1.el5
  • H
Resource Exhaustion

<0:2.6.32-100.24.1.el5
  • H
Integer Overflow or Wraparound

<0:2.6.32-100.21.1.el5
  • H
Resource Management Errors

<0:2.6.32-100.21.1.el5
  • M
CVE-2010-3086

<0:2.6.18-194.26.1.0.1.el5
  • M
Access Restriction Bypass

<0:2.6.18-194.26.1.0.1.el5
  • M
Information Exposure

<0:2.6.18-194.26.1.0.1.el5
  • M
CVE-2010-3066

<0:2.6.18-194.26.1.0.1.el5
  • H
Improper Validation of Specified Quantity in Input

<0:2.6.32-100.21.1.el5
  • H
Numeric Errors

<0:2.6.18-194.17.1.0.1.el5
  • H
Information Exposure

<0:2.6.32-100.20.1.el5
  • H
Memory Leak

<0:2.6.32-100.20.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-194.17.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-194.17.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-194.11.4.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-194.17.1.0.1.el5
  • H
Arbitrary Code Injection

<0:2.6.18-194.11.3.0.1.el5
  • H
Buffer Overflow

<0:2.6.18-194.17.1.0.1.el5
  • H
CVE-2010-2066

<0:2.6.18-194.11.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-194.11.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-194.11.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-194.11.1.0.1.el5
  • H
CVE-2010-2524

<0:2.6.18-194.11.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-194.11.1.0.1.el5
  • H
CVE-2010-2070

<0:2.6.18-194.11.1.0.1.el5
  • H
CVE-2010-1088

<0:2.6.18-194.8.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-194.8.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-194.8.1.0.1.el5
  • H
CVE-2010-1087

<0:2.6.18-194.8.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-194.8.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-194.8.1.0.1.el5
  • H
CVE-2010-0622

<0:2.6.18-194.8.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-194.8.1.0.1.el5
  • H
Race Condition

<0:2.6.18-194.8.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-194.3.1.0.1.el5
  • H
CVE-2010-0307

<0:2.6.18-194.3.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-194.3.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-194.3.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-194.3.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-194.el5
  • H
Race Condition

<0:2.6.18-194.el5
  • H
Resource Management Errors

<0:2.6.18-194.el5
  • H
Access Restriction Bypass

<0:2.6.18-164.15.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.15.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-164.15.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.15.1.0.1.el5
  • H
CVE-2010-0415

<0:2.6.18-164.15.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.11.1.0.1.el5
  • H
CVE-2010-0437

<0:2.6.18-164.15.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-419.0.0.0.12.el5
  • H
Resource Management Errors

<0:2.6.18-194.el5
  • H
Improper Validation of Array Index

<0:2.6.18-164.11.1.0.1.el5
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.6.18-164.11.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.11.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-164.11.1.0.1.el5
  • H
Improper Locking

<0:2.6.18-164.11.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-164.11.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.11.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-164.11.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-164.10.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.11.1.0.1.el5
  • H
CVE-2009-4538

<0:2.6.18-164.10.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-164.10.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-164.10.1.0.1.el5
  • H
Resource Exhaustion

<0:2.6.18-164.9.1.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-164.9.1.0.1.el5
  • H
Information Exposure

<0:2.6.18-164.9.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.9.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.6.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-164.6.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-164.6.1.0.1.el5
  • H
Missing Initialization of Resource

<0:2.6.18-164.6.1.0.1.el5
  • H
Race Condition

<0:2.6.18-164.6.1.0.1.el5
  • H
CVE-2009-2908

<0:2.6.18-164.6.1.0.1.el5
  • M
CVE-2009-2849

<0:2.6.18-164.2.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-164.el5
  • H
Improper Privilege Management

<0:2.6.18-164.el5
  • H
Improper Input Validation

<0:2.6.18-164.el5
  • H
Improper Input Validation

<0:2.6.18-164.el5
  • H
Use of Uninitialized Resource

<0:2.6.18-128.7.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-164.el5
  • H
CVE-2009-2847

<0:2.6.18-164.el5
  • H
NULL Pointer Dereference

<0:2.6.18-128.7.1.0.1.el5
  • H
Improper Locking

<0:2.6.18-128.4.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.4.1.0.1.el5
  • H
Configuration

<0:2.6.18-128.4.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.4.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.4.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-128.4.1.0.1.el5
  • H
Numeric Errors

<0:2.6.18-128.4.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-128.1.14.0.1.el5
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<0:2.6.18-128.1.14.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.1.14.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.1.14.0.1.el5
  • H
CVE-2009-1192

<0:2.6.18-128.1.14.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-128.1.14.0.1.el5
  • H
Race Condition

<0:2.6.18-128.1.10.0.1.el5
  • H
Configuration

<0:2.6.18-128.1.14.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-128.1.10.0.1.el5
  • H
CVE-2009-0834

<0:2.6.18-128.1.10.0.1.el5
  • H
Numeric Errors

<0:2.6.18-128.1.10.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-128.1.10.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-128.1.6.0.1.el5
  • H
Out-of-bounds Write

<0:2.6.18-128.1.6.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-128.1.6.0.1.el5
  • H
Numeric Errors

<0:2.6.18-128.1.6.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-128.1.6.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-128.1.6.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.1.1.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-128.1.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-128.1.1.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.1.1.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-128.1.6.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-128.1.1.0.1.el5
  • H
CVE-2009-0778

<0:2.6.18-128.1.6.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-128.el5
  • H
Race Condition

<0:2.6.18-128.el5
  • H
CVE-2008-5029

<0:2.6.18-128.el5
  • H
Resource Management Errors

<0:2.6.18-128.1.1.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-128.el5
  • H
Access Restriction Bypass

<0:2.6.18-92.1.22.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-92.1.22.0.1.el5
  • H
Improper Authentication

<0:2.6.18-92.1.22.0.1.el5
  • H
CVE-2006-5755

<0:2.6.18-92.1.17.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-92.1.17.0.1.el5
  • H
Improper Locking

<0:2.6.18-92.1.17.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-92.1.17.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-92.1.17.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-92.1.17.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-92.1.17.0.1.el5
  • H
Numeric Errors

<0:2.6.18-92.1.17.0.1.el5
  • H
Buffer Overflow

<0:2.6.18-92.1.13.0.1.el5
  • H
CVE-2007-6716

<0:2.6.18-92.1.13.0.1.el5
  • H
Information Exposure

<0:2.6.18-92.1.13.0.1.el5
  • H
Improper Privilege Management

<0:2.6.18-92.1.13.0.1.el5
  • H
Information Exposure

<0:2.6.18-92.1.13.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-92.1.10.0.1.el5
  • H
NULL Pointer Dereference

<0:2.6.18-92.1.10.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-92.1.10.0.1.el5
  • H
Information Exposure

<0:2.6.18-92.1.6.0.2.el5
  • H
Numeric Errors

<0:2.6.18-92.1.6.0.2.el5
  • H
Information Exposure

<0:2.6.18-92.1.6.0.2.el5
  • H
Numeric Errors

<0:2.6.18-53.1.21.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.21.0.1.el5
  • H
Configuration

<0:2.6.18-53.1.21.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.21.0.1.el5
  • H
Arbitrary Code Injection

<0:2.6.18-53.1.19.0.1.el5
  • H
Race Condition

<0:2.6.18-53.1.19.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.19.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.19.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.19.0.1.el5
  • H
CVE-2008-1619

<0:2.6.18-53.1.19.0.1.el5
  • H
CVE-2006-6921

<0:2.6.18-53.1.14.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-53.1.14.0.1.el5
  • H
CVE-2008-0001

<0:2.6.18-53.1.6.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-53.1.14.0.1.el5
  • H
Numeric Errors

<0:2.6.18-53.1.14.0.1.el5
  • H
Arbitrary Code Injection

<0:2.6.18-53.1.13.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.14.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-53.1.6.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.6.0.1.el5
  • H
Information Exposure

<0:2.6.18-53.1.6.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-53.1.6.0.1.el5
  • H
Numeric Errors

<0:2.6.18-53.1.4.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-53.1.4.0.1.el5
  • H
CVE-2007-4571

<0:2.6.18-53.1.4.0.1.el5
  • M
CVE-2007-4133

<0:2.6.18-8.1.15.0.1.el5
  • L
Information Exposure

<0:2.6.18-8.1.15.0.1.el5
  • M
Out-of-Bounds

<0:2.6.18-8.1.15.0.1.el5
  • M
Improper Input Validation

<0:2.6.18-8.1.15.0.1.el5
  • L
CVE-2007-4308

<0:2.6.18-8.1.15.0.1.el5
  • M
CVE-2007-3513

<0:2.6.18-8.1.15.0.1.el5
  • M
CVE-2007-4574

<0:2.6.18-8.1.15.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-8.1.14.0.2.el5
  • L
CVE-2007-3848

<0:2.6.18-8.1.15.0.1.el5
  • M
Configuration

<0:2.6.18-8.1.15.0.1.el5
  • H
Access Restriction Bypass

<0:2.6.18-8.1.10.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-8.1.10.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-8.1.10.0.1.el5
  • H
CVE-2007-3843

<0:2.6.18-8.1.10.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-8.1.10.0.1.el5
  • M
CVE-2007-3107

<0:2.6.18-8.1.8.0.1.el5
  • H
CVE-2007-2876

<0:2.6.18-8.1.10.0.1.el5
  • H
CVE-2007-2878

<0:2.6.18-8.1.10.0.1.el5
  • H
Numeric Errors

<0:2.6.18-8.1.10.0.1.el5
  • H
CVE-2007-1353

<0:2.6.18-8.1.6.0.1.el5
  • H
CVE-2007-2525

<0:2.6.18-8.1.6.0.1.el5
  • H
CVE-2007-2453

<0:2.6.18-8.1.6.0.1.el5
  • H
CVE-2006-7203

<0:2.6.18-8.1.6.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-8.1.4.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-8.1.4.0.1.el5
  • H
CVE-2007-1497

<0:2.6.18-8.1.4.0.1.el5
  • H
Resource Management Errors

<0:2.6.18-8.1.4.0.1.el5
  • H
CVE-2007-2242

<0:2.6.18-8.1.4.0.1.el5
  • H
CVE-2007-0006

<0:2.6.18-8.1.4.0.1.el5
  • H
CVE-2007-1000

<0:2.6.18-8.1.4.0.1.el5
  • H
CVE-2007-0771

<0:2.6.18-8.1.4.0.1.el5
  • H
Improper Input Validation

<0:2.6.18-8.1.4.0.1.el5
  • H
Out-of-Bounds

<0:2.6.18-8.1.4.0.1.el5
  • H
CVE-2007-1496

<0:2.6.18-8.1.4.0.1.el5
  • H
CVE-2007-0958

<0:2.6.18-8.1.4.0.1.el5