kernel-uek-doc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-uek-doc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2012-2021

<0:2.6.39-100.10.1.el5uek
  • H
ELSA-2012-2022

<0:2.6.39-200.24.1.el5uek
  • H
ELSA-2012-2025

<0:2.6.39-200.29.2.el5uek
  • H
Numeric Errors

<0:2.6.39-400.327.1.el5uek
  • H
Integer Underflow

<0:2.6.39-400.326.1.el5uek
  • H
Race Condition

<0:2.6.39-400.326.1.el5uek
  • H
Improper Resource Shutdown or Release

<0:2.6.39-400.327.1.el5uek
  • H
Memory Leak

<0:2.6.39-400.325.1.el5uek
  • H
Use After Free

<0:2.6.39-400.324.1.el5uek
  • H
Use After Free

<0:2.6.39-400.323.1.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.322.1.el5uek
  • H
Memory Leak

<0:2.6.39-400.321.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.320.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.326.1.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.325.1.el5uek
  • H
Use After Free

<0:2.6.39-400.323.1.el5uek
  • H
Race Condition

<0:2.6.39-400.323.1.el5uek
  • H
Memory Leak

<0:2.6.39-400.318.1.el5uek
  • H
Memory Leak

<0:2.6.39-400.326.1.el5uek
  • H
Missing Release of Resource after Effective Lifetime

<0:2.6.39-400.324.1.el5uek
  • H
Use After Free

<0:2.6.39-400.322.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.317.1.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.316.1.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.316.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.316.1.el5uek
  • H
Memory Leak

<0:2.6.39-400.317.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.317.1.el5uek
  • H
Use After Free

<0:2.6.39-400.317.1.el5uek
  • H
Incorrect Default Permissions

<0:2.6.39-400.317.1.el5uek
  • H
Missing Authorization

<0:2.6.39-400.317.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.316.1.el5uek
  • H
Divide By Zero

<0:2.6.39-400.316.1.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.315.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.315.1.el5uek
  • H
Race Condition

<0:2.6.39-400.311.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.308.1.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.308.1.el5uek
  • H
Use After Free

<0:2.6.39-400.307.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.306.1.el5uek
  • H
Missing Authorization

<0:2.6.39-400.305.1.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.305.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.305.1.el5uek
  • H
CVE-2019-11135

<0:2.6.39-400.316.1.el5uek
  • H
CVE-2019-11884

<0:2.6.39-400.312.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.311.1.el5uek
  • H
Resource Exhaustion

<0:2.6.39-400.316.1.el5uek
  • H
Memory Leak

<0:2.6.39-400.319.1.el5uek
  • H
CVE-2019-1125

<0:2.6.39-400.314.1.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.305.1.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.307.1.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.312.2.el5uek
  • H
Allocation of Resources Without Limits or Throttling

<0:2.6.39-400.312.2.el5uek
  • H
Resource Exhaustion

<0:2.6.39-400.312.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.310.1.el5uek
  • H
CVE-2019-11091

<0:2.6.39-400.310.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.312.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.312.1.el5uek
  • H
Incorrect Type Conversion or Cast

<0:2.6.39-400.307.1.el5uek
  • H
Race Condition

<0:2.6.39-400.307.1.el5uek
  • H
Improper Access Control

<0:2.6.39-400.304.1.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.304.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.304.1.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.304.1.el5uek
  • H
CVE-2018-1000204

<0:2.6.39-400.304.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.304.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.302.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.302.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.302.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.300.2.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.300.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.300.2.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.299.3.el5uek
  • H
CVE-2016-2543

<0:2.6.39-400.299.3.el5uek
  • H
Race Condition

<0:2.6.39-400.299.3.el5uek
  • H
Race Condition

<0:2.6.39-400.299.3.el5uek
  • H
Race Condition

<0:2.6.39-400.299.3.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.299.3.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.299.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.299.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.299.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.299.1.el5uek
  • H
CVE-2018-100199

<0:2.6.39-400.298.6.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.299.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.299.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.300.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.298.3.el5uek
  • H
Use After Free

<0:2.6.39-400.298.3.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.298.3.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.305.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.306.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.301.1.el5uek
  • H
Missing Release of Resource after Effective Lifetime

<0:2.6.39-400.303.1.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.304.1.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.301.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.301.1.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.304.1.el5uek
  • H
Use After Free

<0:2.6.39-400.301.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.300.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.299.3.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.300.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.299.3.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.299.1.el5uek
  • H
Race Condition

<0:2.6.39-400.298.7.el5uek
  • H
Use After Free

<0:2.6.39-400.298.3.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.299.1.el5uek
  • H
Race Condition

<0:2.6.39-400.305.1.el5uek
  • H
Missing Authorization

<0:2.6.39-400.299.1.el5uek
  • H
Race Condition

<0:2.6.39-400.313.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.313.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.298.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.298.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.298.2.el5uek
  • H
Resource Exhaustion

<0:2.6.39-400.298.1.el5uek
  • H
Buffer Overflow

<0:2.6.39-400.297.12.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.297.12.el5uek
  • H
Use After Free

<0:2.6.39-400.297.12.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.297.12.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.297.12.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.298.3.el5uek
  • H
CVE-2017-1000365

<0:2.6.39-400.297.8.el5uek
  • H
Code

<0:2.6.39-400.297.5.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.297.5.el5uek
  • H
Race Condition

<0:2.6.39-400.297.5.el5uek
  • H
Incorrect Calculation

<0:2.6.39-400.297.8.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.297.12.el5uek
  • H
Numeric Errors

<0:2.6.39-400.297.5.el5uek
  • H
CVE-2017-7273

<0:2.6.39-400.297.5.el5uek
  • H
CVE-2017-5669

<0:2.6.39-400.295.2.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.295.2.el5uek
  • H
CVE-2015-9731

<0:2.6.39-400.295.2.el5uek
  • H
CVE-2015-5257

<0:2.6.39-400.295.2.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.295.2.el5uek
  • H
Improperly Implemented Security Check for Standard

<0:2.6.39-400.294.7.el5uek
  • H
Information Exposure

<0:2.6.39-400.294.6.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.294.6.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.6.el5uek
  • H
CVE-2016-3140

<0:2.6.39-400.294.6.el5uek
  • H
Security Features

<0:2.6.39-400.294.6.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.294.6.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.6.el5uek
  • H
Race Condition

<0:2.6.39-400.294.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.294.2.el5uek
  • H
CVE-2013-7446

<0:2.6.39-400.294.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.294.2.el5uek
  • H
Race Condition

<0:2.6.39-400.294.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.297.12.el5uek
  • H
Divide By Zero

<0:2.6.39-400.298.3.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.297.11.el5uek
  • H
CVE-2017-7184

<0:2.6.39-400.295.2.el5uek
  • H
Use After Free

<0:2.6.39-400.297.11.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.39-400.297.11.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.297.9.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.297.8.el5uek
  • H
CVE-2017-2671

<0:2.6.39-400.298.1.el5uek
  • H
Improper Verification of Cryptographic Signature

<0:2.6.39-400.297.6.el5uek
  • H
Resource Exhaustion

<0:2.6.39-400.297.6.el5uek
  • H
Resource Exhaustion

<0:2.6.39-400.304.1.el5uek
  • H
CVE-2017-9075

<0:2.6.39-400.297.12.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.295.2.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.298.3.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.297.6.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.6.el5uek
  • H
Double Free

<0:2.6.39-400.296.2.el5uek
  • H
Error Handling

<0:2.6.39-400.300.2.el5uek
  • H
CVE-2017-9077

<0:2.6.39-400.297.12.el5uek
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.6.39-400.298.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.297.12.el5uek
  • H
Improper Access Control

<0:2.6.39-400.294.6.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.297.6.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.297.3.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.296.2.el5uek
  • H
CVE-2017-2583

<0:2.6.39-400.295.2.el5uek
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.39-400.295.2.el5uek
  • H
Incorrect Conversion between Numeric Types

<0:2.6.39-400.297.12.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.297.4.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.294.2.el5uek
  • H
Race Condition

<0:2.6.39-400.295.2.el5uek
  • H
Improper Access Control

<0:2.6.39-400.294.6.el5uek
  • H
Use After Free

<0:2.6.39-400.294.6.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.1.el5uek
  • H
Use After Free

<0:2.6.39-400.294.7.el5uek
  • H
Code

<0:2.6.39-400.294.6.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.294.1.el5uek
  • H
Race Condition

<0:2.6.39-400.294.6.el5uek
  • H
Double Free

<0:2.6.39-400.294.3.el5uek
  • H
Use After Free

<0:2.6.39-400.294.1.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.293.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.293.2.el5uek
  • H
Improper Data Handling

<0:2.6.39-400.293.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.305.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.284.2.el5uek
  • H
Race Condition

<0:2.6.39-400.290.2.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.290.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.290.2.el5uek
  • H
CVE-2016-2384

<0:2.6.39-400.299.3.el5uek
  • H
Race Condition

<0:2.6.39-400.290.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.290.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.283.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.290.2.el5uek
  • H
Race Condition

<0:2.6.39-400.286.3.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.290.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.286.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.286.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.284.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.284.2.el5uek
  • H
CVE-2016-4470

<0:2.6.39-400.283.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.37.18.el5uek
  • H
CVE-2015-8324

<0:2.6.32-400.37.17.el5uek
  • H
CVE-2015-8543

<0:2.6.32-400.37.17.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.37.17.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.278.3.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.37.17.el5uek
  • M
Race Condition

<0:2.6.39-400.278.2.el5uek
  • H
CVE-2015-6937

<0:2.6.39-400.295.2.el5uek
  • M
Information Exposure

<0:2.6.39-400.250.10.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.250.2.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.264.13.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.37.15.el5uek
  • H
Improper Privilege Management

<0:2.6.32-400.37.15.el5uek
  • H
Race Condition

<0:2.6.39-400.264.13.el5uek
  • H
Race Condition

<0:2.6.39-400.264.13.el5uek
  • H
Improper Privilege Management

<0:2.6.32-400.37.15.el5uek
  • M
Out-of-Bounds

<0:2.6.32-400.37.12.el5uek
  • H
Code

<0:2.6.39-400.294.6.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.250.11.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.250.11.el5uek
  • M
CVE-2014-9715

<0:2.6.32-400.37.10.el5uek
  • M
Race Condition

<0:2.6.39-400.250.9.el5uek
  • M
Numeric Errors

<0:2.6.39-400.250.9.el5uek
  • M
Improper Privilege Management

<0:2.6.32-400.37.9.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-400.37.9.el5uek
  • M
Code

<0:2.6.32-400.37.7.el5uek
  • M
CVE-2015-3636

<0:2.6.39-400.250.7.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.250.6.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.250.6.el5uek
  • H
Information Exposure

<0:2.6.32-400.37.5.el5uek
  • H
CVE-2014-9585

<0:2.6.32-400.37.5.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.37.5.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.37.4.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.250.2.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.249.4.el5uek
  • H
CVE-2015-1421

<0:2.6.32-400.37.3.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.249.3.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.37.2.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.37.2.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.248.3.el5uek
  • H
Out-of-bounds Read

<0:2.6.39-400.248.3.el5uek
  • H
Information Exposure

<0:2.6.32-400.37.2.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.36.14.el5uek
  • H
Code

<0:2.6.39-400.215.15.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.215.15.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.36.13.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.36.13.el5uek
  • H
Improper Privilege Management

<0:2.6.39-400.215.15.el5uek
  • H
Information Exposure

<0:2.6.39-400.215.14.el5uek
  • H
Information Exposure

<0:2.6.39-400.215.14.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.215.14.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.12.el5uek
  • H
Race Condition

<0:2.6.39-400.215.14.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.215.14.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.12.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.36.12.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.215.14.el5uek
  • H
Resource Exhaustion

<0:2.6.39-400.215.13.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.215.13.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.215.12.el5uek
  • H
Race Condition

<0:2.6.32-400.36.10.el5uek
  • H
Numeric Errors

<0:2.6.39-400.215.11.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-400.36.9.el5uek
  • H
Resource Exhaustion

<0:2.6.32-400.36.9.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.9.el5uek
  • H
Use After Free

<0:2.6.32-400.36.9.el5uek
  • H
Use After Free

<0:2.6.32-400.36.9.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.9.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.10.el5uek
  • H
Information Exposure

<0:2.6.32-400.36.8.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.8.el5uek
  • H
CVE-2014-4667

<0:2.6.32-400.36.7.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.36.6.el5uek
  • H
Improper Privilege Management

<0:2.6.32-400.36.4.el5uek
  • H
Race Condition

<0:2.6.39-400.215.4.el5uek
  • H
Numeric Errors

<0:2.6.32-400.36.3.el5uek
  • H
CVE-2014-3153

<0:2.6.32-400.36.2.el5uek
  • H
Out-of-bounds Read

<0:2.6.32-400.36.6.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.36.3.el5uek
  • H
Use After Free

<0:2.6.39-400.214.5.el5uek
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.39-400.215.3.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.6.el5uek
  • H
Information Exposure

<0:2.6.39-400.215.3.el5uek
  • H
Race Condition

<0:2.6.32-400.36.6.el5uek
  • H
Out-of-bounds Write

<0:2.6.39-400.214.6.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.34.4.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.214.4.el5uek
  • H
CVE-2014-0055

<0:2.6.39-400.214.4.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.214.6.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.214.3.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.34.3.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.214.3.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.209.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.209.1.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.209.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.39-400.109.6.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.209.1.el5uek
  • H
Information Exposure

<0:2.6.39-400.209.1.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.109.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.109.1.el5uek
  • M
Resource Management Errors

<0:2.6.39-300.28.1.el5uek
  • H
Numeric Errors

<0:2.6.32-400.33.4.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.33.4.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el5uek
  • H
Information Exposure

<0:2.6.32-400.33.3.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.211.2.el5uek
  • H
Use of Externally-Controlled Format String

<0:2.6.32-400.29.3.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.211.2.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.33.3.el5uek
  • H
CVE-2013-0343

<0:2.6.32-400.33.3.el5uek
  • H
Numeric Errors

<0:2.6.32-400.33.3.el5uek
  • M
Information Exposure

<0:2.6.32-400.33.2.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.33.4.el5uek
  • M
Resource Management Errors

<0:2.6.32-400.33.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.209.1.el5uek
  • H
CVE-2013-2206

<0:2.6.32-400.29.3.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.109.6.el5uek
  • M
Information Exposure

<0:2.6.39-400.109.3.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.29.3.el5uek
  • H
Information Exposure

<0:2.6.39-400.209.1.el5uek
  • M
Resource Management Errors

<0:2.6.39-400.109.3.el5uek
  • H
Improper Input Validation

<0:2.6.39-400.109.1.el5uek
  • M
CVE-2013-3301

<0:2.6.39-400.109.3.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.2.el5uek
  • M
Use of Externally-Controlled Format String

<0:2.6.32-400.29.2.el5uek
  • M
Resource Management Errors

<0:2.6.39-400.109.3.el5uek
  • M
Out-of-Bounds

<0:2.6.32-400.29.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.39-400.109.3.el5uek
  • H
Information Exposure

<0:2.6.39-400.109.6.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.211.2.el5uek
  • H
Information Exposure

<0:2.6.39-400.211.2.el5uek
  • M
Information Exposure

<0:2.6.39-400.109.3.el5uek
  • C
Numeric Errors

<0:2.6.39-400.24.1.el5uek
  • M
Improper Input Validation

<0:2.6.32-400.29.1.el5uek
  • M
Improper Input Validation

<0:2.6.39-300.28.1.el5uek
  • H
Numeric Errors

<0:2.6.39-400.21.1.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.26.2.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.21.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • M
Out-of-Bounds

<0:2.6.39-300.28.1.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • H
Out-of-Bounds

<0:2.6.39-400.21.1.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • H
Resource Management Errors

<0:2.6.39-400.21.2.el5uek
  • H
Race Condition

<0:2.6.32-400.26.2.el5uek
  • H
CVE-2013-1827

<0:2.6.32-400.26.2.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el5uek
  • H
CVE-2013-1826

<0:2.6.32-400.26.2.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.26.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.39.5.el5uek
  • H
Numeric Errors

<0:2.6.39-400.17.1.el5uek
  • H
Race Condition

<0:2.6.32-400.26.2.el5uek
  • H
CVE-2013-0311

<0:2.6.39-400.17.1.el5uek
  • M
Improper Input Validation

<0:2.6.39-300.28.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.39-400.23.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el5uek
  • M
Information Exposure

<0:2.6.32-300.39.4.el5uek
  • M
CVE-2012-4461

<0:2.6.39-300.28.1.el5uek
  • M
Improper Input Validation

<0:2.6.39-300.28.1.el5uek
  • M
Numeric Errors

<0:2.6.39-300.17.3.el5uek
  • H
CVE-2012-5517

<0:2.6.32-400.26.2.el5uek
  • M
CVE-2012-4444

<0:2.6.32-300.39.2.el5uek
  • M
Numeric Errors

<0:2.6.39-300.17.3.el5uek
  • H
Race Condition

<0:2.6.32-400.26.2.el5uek
  • M
Out-of-bounds Write

<0:2.6.32-300.39.1.el5uek
  • M
Numeric Errors

<0:2.6.32-300.39.2.el5uek
  • M
Resource Management Errors

<0:2.6.39-300.17.2.el5uek
  • M
Race Condition

<0:2.6.32-300.39.1.el5uek
  • H
Numeric Errors

<0:2.6.32-300.37.1.el5uek
  • M
Resource Management Errors

<0:2.6.39-200.32.1.el5uek
  • M
Information Exposure

<0:2.6.39-200.32.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.39-200.32.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-300.29.2.el5uek
  • H
CVE-2012-3375

<0:2.6.32-300.29.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.27.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-300.27.1.el5uek
  • M
Resource Management Errors

<0:2.6.39-100.7.1.el5uek
  • M
Improper Input Validation

<0:2.6.39-100.6.1.el5uek
  • M
NULL Pointer Dereference

<0:2.6.32-300.21.1.el5uek
  • M
Resource Exhaustion

<0:2.6.32-300.21.1.el5uek
  • H
CVE-2012-0045

<0:2.6.32-300.11.1.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-300.11.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-300.11.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.11.1.el5uek
  • H
Resource Exhaustion

<0:2.6.32-300.29.2.el5uek
  • H
CVE-2011-4622

<0:2.6.32-300.11.1.el5uek
  • M
Out-of-Bounds

<0:2.6.39-100.7.1.el5uek
  • H
Divide By Zero

<0:2.6.32-300.11.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.7.1.el5uek
  • H
CVE-2011-1493

<0:2.6.32-300.4.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-300.11.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-300.11.1.el5uek
  • M
Information Exposure

<0:2.6.32-300.3.1.el5uek
  • M
Out-of-Bounds

<0:2.6.32-300.3.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.4.1.el5uek
  • M
CVE-2011-3638

<0:2.6.32-300.3.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el5uek
  • M
Information Exposure

<0:2.6.32-300.3.1.el5uek
  • H
Resource Management Errors

<0:2.6.32-200.23.1.el5uek
  • H
Resource Management Errors

<0:2.6.32-200.23.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.23.1.el5uek
  • H
Buffer Overflow

<0:2.6.32-200.23.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.23.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-200.23.1.el5uek
  • H
CVE-2011-3188

<0:2.6.32-200.23.1.el5uek
  • H
CVE-2011-2699

<0:2.6.32-200.23.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.20.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-200.20.1.el5uek
  • H
Resource Management Errors

<0:2.6.32-200.20.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-200.20.1.el5uek
  • H
Numeric Errors

<0:2.6.32-200.20.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-200.19.1.el5uek
  • H
Race Condition

<0:2.6.32-200.19.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-200.19.1.el5uek
  • H
Resource Exhaustion

<0:2.6.32-200.19.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el5uek
  • M
NULL Pointer Dereference

<0:2.6.32-300.3.1.el5uek
  • H
Integer Underflow

<0:2.6.32-200.19.1.el5uek
  • H
Off-by-one Error

<0:2.6.32-200.19.1.el5uek
  • M
Race Condition

<0:2.6.32-100.37.1.el5uek
  • M
CVE-2011-1767

<0:2.6.32-100.37.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-300.4.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.19.1.el5uek
  • H
Integer Underflow

<0:2.6.32-100.35.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-100.35.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-100.35.1.el5uek
  • H
Resource Exhaustion

<0:2.6.32-100.28.17.el5
  • H
Access Restriction Bypass

<0:2.6.32-100.28.15.el5
  • M
Out-of-Bounds

<0:2.6.32-300.3.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
Integer Overflow or Wraparound

<0:2.6.32-100.28.15.el5
  • H
Out-of-bounds Write

<0:2.6.32-100.28.15.el5
  • H
Numeric Errors

<0:2.6.32-100.28.17.el5
  • H
CVE-2011-1023

<0:2.6.32-100.28.17.el5
  • H
Information Exposure

<0:2.6.32-100.28.17.el5
  • H
Race Condition

<0:2.6.32-100.28.11.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
Information Exposure

<0:2.6.32-100.28.17.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.17.el5
  • H
Buffer Overflow

<0:2.6.32-100.28.15.el5
  • H
Incorrect Calculation

<0:2.6.32-100.28.15.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.15.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.17.el5
  • H
Information Exposure

<0:2.6.32-100.28.15.el5
  • H
Information Exposure

<0:2.6.32-100.28.17.el5
  • H
CVE-2011-1019

<0:2.6.32-100.28.15.el5
  • H
Missing Initialization of Resource

<0:2.6.32-100.28.15.el5
  • H
Information Exposure

<0:2.6.32-100.28.15.el5
  • H
Buffer Overflow

<0:2.6.32-100.28.11.el5
  • H
Out-of-bounds Write

<0:2.6.32-100.28.11.el5
  • H
Out-of-Bounds

<0:2.6.32-100.28.11.el5
  • H
CVE-2010-4648

<0:2.6.32-100.28.11.el5
  • H
Resource Management Errors

<0:2.6.32-100.28.11.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.11.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.11.el5
  • H
Improper Initialization

<0:2.6.32-100.28.11.el5
  • H
Resource Exhaustion

<0:2.6.32-100.28.17.el5
  • H
Use After Free

<0:2.6.32-100.28.9.el5
  • H
Divide By Zero

<0:2.6.32-100.28.9.el5
  • H
Resource Exhaustion

<0:2.6.32-100.28.9.el5
  • H
Resource Exhaustion

<0:2.6.32-100.28.9.el5
  • H
Improper Input Validation

<0:2.6.32-300.7.1.el5uek