kernel-uek-headers vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-uek-headers package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Code

<0:2.6.32-400.36.13.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.36.13.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.36.13.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.36.13.el5uek
  • H
Improper Privilege Management

<0:2.6.32-400.36.13.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.36.12.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.12.el5uek
  • H
Race Condition

<0:2.6.32-400.36.12.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.10.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.12.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.36.12.el5uek
  • H
Resource Exhaustion

<0:2.6.32-400.36.11.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.36.11.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.10.el5uek
  • H
Race Condition

<0:2.6.32-400.36.10.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-400.36.9.el5uek
  • H
Resource Exhaustion

<0:2.6.32-400.36.9.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.9.el5uek
  • H
Use After Free

<0:2.6.32-400.36.9.el5uek
  • H
Use After Free

<0:2.6.32-400.36.9.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.9.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.10.el5uek
  • H
Information Exposure

<0:2.6.32-400.36.8.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.36.8.el5uek
  • H
CVE-2014-4667

<0:2.6.32-400.36.7.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.36.6.el5uek
  • H
Improper Privilege Management

<0:2.6.32-400.36.4.el5uek
  • H
Race Condition

<0:2.6.32-400.36.4.el5uek
  • H
Numeric Errors

<0:2.6.32-400.36.3.el5uek
  • H
CVE-2014-3153

<0:2.6.32-400.36.2.el5uek
  • H
Out-of-bounds Read

<0:2.6.32-400.36.6.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.36.3.el5uek
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.32-400.36.3.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-400.36.6.el5uek
  • H
Information Exposure

<0:2.6.32-400.36.3.el5uek
  • H
Race Condition

<0:2.6.32-400.36.6.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.34.4.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-400.34.4.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.34.5.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.34.3.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.34.3.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.34.3.el5uek
  • M
Out-of-Bounds

<0:2.6.32-400.29.1.el5uek
  • H
Numeric Errors

<0:2.6.32-400.33.4.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.33.4.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el5uek
  • H
Information Exposure

<0:2.6.32-400.33.3.el5uek
  • H
Use of Externally-Controlled Format String

<0:2.6.32-400.29.3.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.33.3.el5uek
  • H
CVE-2013-0343

<0:2.6.32-400.33.3.el5uek
  • H
Numeric Errors

<0:2.6.32-400.33.3.el5uek
  • M
Information Exposure

<0:2.6.32-400.33.2.el5uek
  • H
Resource Management Errors

<0:2.6.32-400.33.4.el5uek
  • M
Resource Management Errors

<0:2.6.32-400.33.2.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.33.3.el5uek
  • H
CVE-2013-2206

<0:2.6.32-400.29.3.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.29.3.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.2.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.29.3.el5uek
  • H
Information Exposure

<0:2.6.32-400.33.3.el5uek
  • M
Resource Management Errors

<0:2.6.32-400.29.2.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.2.el5uek
  • M
Use of Externally-Controlled Format String

<0:2.6.32-400.29.2.el5uek
  • M
Out-of-Bounds

<0:2.6.32-400.29.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-400.29.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.29.3.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.33.3.el5uek
  • H
Information Exposure

<0:2.6.32-400.33.3.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.2.el5uek
  • M
Improper Input Validation

<0:2.6.32-400.29.1.el5uek
  • M
Information Exposure

<0:2.6.32-400.29.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-400.26.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • H
Information Exposure

<0:2.6.32-400.26.2.el5uek
  • H
Race Condition

<0:2.6.32-400.26.2.el5uek
  • H
CVE-2013-1827

<0:2.6.32-400.26.2.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el5uek
  • H
CVE-2013-1826

<0:2.6.32-400.26.2.el5uek
  • H
Improper Input Validation

<0:2.6.32-400.26.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.39.5.el5uek
  • H
Race Condition

<0:2.6.32-400.26.2.el5uek
  • M
Improper Input Validation

<0:2.6.32-300.39.4.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-400.29.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-400.26.2.el5uek
  • M
Information Exposure

<0:2.6.32-300.39.4.el5uek
  • H
CVE-2012-5517

<0:2.6.32-400.26.2.el5uek
  • M
CVE-2012-4444

<0:2.6.32-300.39.2.el5uek
  • M
Numeric Errors

<0:2.6.32-300.39.2.el5uek
  • H
Race Condition

<0:2.6.32-400.26.2.el5uek
  • M
Out-of-bounds Write

<0:2.6.32-300.39.1.el5uek
  • M
Numeric Errors

<0:2.6.32-300.39.2.el5uek
  • M
Resource Management Errors

<0:2.6.32-300.39.1.el5uek
  • M
Race Condition

<0:2.6.32-300.39.1.el5uek
  • H
Numeric Errors

<0:2.6.32-300.37.1.el5uek
  • M
Resource Management Errors

<0:2.6.32-300.32.3.el5uek
  • M
Information Exposure

<0:2.6.32-300.32.3.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-300.32.3.el5uek
  • H
Out-of-Bounds

<0:2.6.32-300.29.2.el5uek
  • H
CVE-2012-3375

<0:2.6.32-300.29.2.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.27.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-300.27.1.el5uek
  • M
Improper Input Validation

<0:2.6.32-300.21.1.el5uek
  • M
NULL Pointer Dereference

<0:2.6.32-300.21.1.el5uek
  • M
Resource Exhaustion

<0:2.6.32-300.21.1.el5uek
  • H
CVE-2012-0045

<0:2.6.32-300.11.1.el5uek
  • H
Integer Overflow or Wraparound

<0:2.6.32-300.11.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-300.11.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.11.1.el5uek
  • H
Resource Exhaustion

<0:2.6.32-300.29.2.el5uek
  • H
CVE-2011-4622

<0:2.6.32-300.11.1.el5uek
  • M
Out-of-Bounds

<0:2.6.32-300.25.1.el5uek
  • H
Divide By Zero

<0:2.6.32-300.11.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.7.1.el5uek
  • H
CVE-2011-1493

<0:2.6.32-300.4.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-300.11.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-300.11.1.el5uek
  • M
Information Exposure

<0:2.6.32-300.3.1.el5uek
  • M
Out-of-Bounds

<0:2.6.32-300.3.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-300.4.1.el5uek
  • M
CVE-2011-3638

<0:2.6.32-300.3.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el5uek
  • M
Information Exposure

<0:2.6.32-300.3.1.el5uek
  • H
Resource Management Errors

<0:2.6.32-200.23.1.el5uek
  • H
Resource Management Errors

<0:2.6.32-200.23.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.23.1.el5uek
  • H
Buffer Overflow

<0:2.6.32-200.23.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.23.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-200.23.1.el5uek
  • H
CVE-2011-3188

<0:2.6.32-200.23.1.el5uek
  • H
CVE-2011-2699

<0:2.6.32-200.23.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.20.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-200.20.1.el5uek
  • H
Resource Management Errors

<0:2.6.32-200.20.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-200.20.1.el5uek
  • H
Numeric Errors

<0:2.6.32-200.20.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-200.19.1.el5uek
  • H
Race Condition

<0:2.6.32-200.19.1.el5uek
  • H
Access Restriction Bypass

<0:2.6.32-200.19.1.el5uek
  • H
Resource Exhaustion

<0:2.6.32-200.19.1.el5uek
  • M
Access Restriction Bypass

<0:2.6.32-300.3.1.el5uek
  • M
NULL Pointer Dereference

<0:2.6.32-300.3.1.el5uek
  • H
Integer Underflow

<0:2.6.32-200.19.1.el5uek
  • H
Off-by-one Error

<0:2.6.32-200.19.1.el5uek
  • M
Race Condition

<0:2.6.32-100.37.1.el5uek
  • M
CVE-2011-1767

<0:2.6.32-100.37.1.el5uek
  • H
Out-of-Bounds

<0:2.6.32-300.4.1.el5uek
  • H
Information Exposure

<0:2.6.32-200.19.1.el5uek
  • H
Integer Underflow

<0:2.6.32-100.35.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-100.35.1.el5uek
  • H
NULL Pointer Dereference

<0:2.6.32-100.35.1.el5uek
  • H
Resource Exhaustion

<0:2.6.32-100.28.17.el5
  • H
Access Restriction Bypass

<0:2.6.32-100.28.15.el5
  • M
Out-of-Bounds

<0:2.6.32-300.3.1.el5uek
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
Integer Overflow or Wraparound

<0:2.6.32-100.28.15.el5
  • H
Out-of-bounds Write

<0:2.6.32-100.28.15.el5
  • H
Numeric Errors

<0:2.6.32-100.28.17.el5
  • H
CVE-2011-1023

<0:2.6.32-100.28.17.el5
  • H
Information Exposure

<0:2.6.32-100.28.17.el5
  • H
Race Condition

<0:2.6.32-100.28.11.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
Information Exposure

<0:2.6.32-100.28.17.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.17.el5
  • H
Buffer Overflow

<0:2.6.32-100.28.15.el5
  • H
Incorrect Calculation

<0:2.6.32-100.28.15.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.15.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.15.el5
  • H
Improper Input Validation

<0:2.6.32-100.28.17.el5
  • H
Information Exposure

<0:2.6.32-100.28.15.el5
  • H
Information Exposure

<0:2.6.32-100.28.17.el5
  • H
CVE-2011-1019

<0:2.6.32-100.28.15.el5
  • H
Missing Initialization of Resource

<0:2.6.32-100.28.15.el5
  • H
Information Exposure

<0:2.6.32-100.28.15.el5
  • H
Buffer Overflow

<0:2.6.32-100.28.11.el5
  • H
Out-of-bounds Write

<0:2.6.32-100.28.11.el5
  • H
Out-of-Bounds

<0:2.6.32-100.28.11.el5
  • H
CVE-2010-4648

<0:2.6.32-100.28.11.el5
  • H
Resource Management Errors

<0:2.6.32-100.28.11.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.11.el5
  • H
NULL Pointer Dereference

<0:2.6.32-100.28.11.el5
  • H
Improper Initialization

<0:2.6.32-100.28.11.el5
  • H
Resource Exhaustion

<0:2.6.32-100.28.17.el5
  • H
Use After Free

<0:2.6.32-100.28.9.el5
  • H
Divide By Zero

<0:2.6.32-100.28.9.el5
  • H
Resource Exhaustion

<0:2.6.32-100.28.9.el5
  • H
Resource Exhaustion

<0:2.6.32-100.28.9.el5
  • H
Improper Input Validation

<0:2.6.32-300.7.1.el5uek