kernel-abi-whitelists vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-abi-whitelists package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:2.6.32-754.53.1.el6
  • H
Use After Free

<0:2.6.32-754.53.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.53.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.53.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.35.1.0.10.el6
  • H
ELSA-2018-0512

<0:2.6.32-696.23.1.el6
  • H
ELSA-2017-0892-1

<0:2.6.32-696.1.1.0.1.el6
  • M
CVE-2021-26401

<0:2.6.32-754.49.1.el6
  • H
Missing Authorization

<0:2.6.32-754.35.1.0.6.el6
  • H
Race Condition

<0:2.6.32-754.35.1.0.6.el6
  • H
Incorrect Calculation of Buffer Size

<0:2.6.32-754.35.1.0.6.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.7.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.35.1.0.4.el6
  • H
Race Condition

<0:2.6.32-754.35.1.0.7.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.35.1.0.5.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.5.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.8.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.35.1.0.3.el6
  • H
Out-of-bounds Read

<0:2.6.32-754.35.1.0.3.el6
  • H
Memory Leak

<0:2.6.32-754.35.1.0.3.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.3.el6
  • H
Numeric Errors

<0:2.6.32-754.35.1.0.2.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-754.33.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.29.2.el6
  • H
CVE-2017-1000371

<0:2.6.32-754.29.1.el6
  • M
Information Exposure

<0:2.6.32-754.31.1.el6
  • H
Buffer Overflow

<0:2.6.32-754.28.1.el6
  • H
Buffer Overflow

<0:2.6.32-754.29.1.el6
  • H
Missing Authorization

<0:2.6.32-754.28.1.el6
  • H
CVE-2019-0155

<0:2.6.32-754.24.3.el6
  • H
CVE-2019-0154

<0:2.6.32-754.24.2.el6
  • H
Improper Input Validation

<0:2.6.32-754.24.2.el6
  • H
CVE-2019-11135

<0:2.6.32-754.24.2.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.25.1.el6
  • H
Buffer Overflow

<0:2.6.32-754.23.1.el6
  • H
Use After Free

<0:2.6.32-754.35.1.el6
  • H
CVE-2019-1125

<0:2.6.32-754.18.2.el6
  • H
Cleartext Transmission of Sensitive Information

<0:2.6.32-754.18.2.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-754.24.2.el6
  • H
Use After Free

<0:2.6.32-754.22.1.el6
  • H
Use After Free

<0:2.6.32-754.15.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.15.3.el6
  • H
Allocation of Resources Without Limits or Throttling

<0:2.6.32-754.15.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.15.3.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
CVE-2019-11091

<0:2.6.32-754.14.2.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
Incorrect Type Conversion or Cast

<0:2.6.32-754.22.1.el6
  • H
Race Condition

<0:2.6.32-754.18.2.el6
  • H
Use After Free

<0:2.6.32-754.11.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.18.2.el6
  • H
Improper Privilege Management

<0:2.6.32-754.12.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.6.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.6.3.el6
  • H
CVE-2018-10901

<0:2.6.32-754.3.5.el6
  • H
Information Exposure

<0:2.6.32-754.3.5.el6
  • H
CVE-2018-3646

<0:2.6.32-754.3.5.el6
  • H
Out-of-Bounds

<0:2.6.32-754.3.5.el6
  • H
CVE-2018-3693

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-754.3.5.el6
  • H
Resource Exhaustion

<0:2.6.32-754.3.5.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-754.2.1.el6
  • H
Use After Free

<0:2.6.32-754.2.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
CVE-2015-8830

<0:2.6.32-754.el6
  • H
Information Exposure

<0:2.6.32-754.2.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.el6
  • H
Information Exposure

<0:2.6.32-754.2.1.el6
  • H
Race Condition

<0:2.6.32-696.28.1.el6
  • H
Information Exposure

<0:2.6.32-696.28.1.el6
  • H
Use After Free

<0:2.6.32-696.28.1.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Out-of-bounds Write

<0:2.6.32-696.28.1.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-696.28.1.el6
  • H
Information Exposure

<0:2.6.32-696.18.7.el6
  • H
Information Exposure

<0:2.6.32-696.18.7.el6
  • H
Information Exposure

<0:2.6.32-696.18.7.el6
  • H
Resource Exhaustion

<0:2.6.32-754.el6
  • M
NULL Pointer Dereference

<0:2.6.32-754.30.2.el6
  • H
Divide By Zero

<0:2.6.32-696.16.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-696.16.1.el6
  • H
Race Condition

<0:2.6.32-696.16.1.el6
  • H
Use After Free

<0:2.6.32-696.20.1.el6
  • M
Out-of-Bounds

<0:2.6.32-696.13.2.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-696.20.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.10.3.el6
  • H
Out-of-bounds Write

<0:2.6.32-696.10.2.el6
  • H
CVE-2017-2671

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
CVE-2017-9075

<0:2.6.32-754.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.33.1.el6
  • H
CVE-2017-9076

<0:2.6.32-754.el6
  • H
Double Free

<0:2.6.32-754.el6
  • H
Error Handling

<0:2.6.32-754.el6
  • H
CVE-2017-9077

<0:2.6.32-754.el6
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.6.32-754.el6
  • H
Out-of-bounds Read

<0:2.6.32-696.20.1.el6
  • H
Improper Input Validation

<0:2.6.32-696.28.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.6.3.el6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-696.3.1.el6
  • H
Incorrect Conversion between Numeric Types

<0:2.6.32-754.el6
  • H
Out-of-Bounds

<0:2.6.32-696.3.2.el6
  • M
Improper Authorization

<0:2.6.32-696.el6
  • M
Improper Access Control

<0:2.6.32-696.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • H
Use After Free

<0:2.6.32-696.1.1.el6
  • M
Code

<0:2.6.32-696.el6
  • M
Out-of-Bounds

<0:2.6.32-696.el6
  • H
Race Condition

<0:2.6.32-696.1.1.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • H
Double Free

<0:2.6.32-642.13.2.el6
  • H
Use After Free

<0:2.6.32-642.13.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • M
Out-of-bounds Read

<0:2.6.32-642.15.1.el6
  • H
Improper Data Handling

<0:2.6.32-642.13.1.el6
  • M
Race Condition

<0:2.6.32-642.15.1.el6
  • M
CVE-2016-2384

<0:2.6.32-696.el6
  • M
Race Condition

<0:2.6.32-696.el6
  • M
Race Condition

<0:2.6.32-696.el6
  • H
Race Condition

<0:2.6.32-642.6.2.el6
  • H
Out-of-Bounds

<0:2.6.32-642.11.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.13.1.el6
  • H
Information Exposure

<0:2.6.32-642.4.2.el6
  • H
Improper Input Validation

<0:2.6.32-642.11.1.el6
  • H
CVE-2016-4470

<0:2.6.32-642.6.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-642.3.1.el6
  • M
CVE-2015-8324

<0:2.6.32-642.el6
  • M
CVE-2015-8543

<0:2.6.32-642.el6
  • M
Out-of-Bounds

<0:2.6.32-642.el6
  • M
Improper Input Validation

<0:2.6.32-642.el6
  • M
Improper Input Validation

<0:2.6.32-642.el6
  • M
Race Condition

<0:2.6.32-573.26.1.el6
  • M
Improper Input Validation

<0:2.6.32-573.22.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-573.26.1.el6
  • M
CVE-2014-8134

<0:2.6.32-642.el6
  • H
Improper Input Validation

<0:2.6.32-573.12.1.el6
  • H
Resource Management Errors

<0:2.6.32-573.12.1.el6
  • H
Resource Management Errors

<0:2.6.32-573.12.1.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • H
Race Condition

<0:2.6.32-573.12.1.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • H
CVE-2015-2925

<0:2.6.32-573.12.1.el6
  • M
Out-of-Bounds

<0:2.6.32-642.el6
  • H
Resource Management Errors

<0:2.6.32-573.3.1.el6
  • H
Resource Management Errors

<0:2.6.32-573.3.1.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • M
Numeric Errors

<0:2.6.32-573.el6
  • M
Improper Privilege Management

<0:2.6.32-573.el6
  • M
Access Restriction Bypass

<0:2.6.32-573.el6
  • M
Code

<0:2.6.32-504.30.3.el6
  • M
CVE-2011-5321

<0:2.6.32-504.30.3.el6
  • M
CVE-2015-3636

<0:2.6.32-504.30.3.el6
  • M
Access Restriction Bypass

<0:2.6.32-504.30.3.el6
  • M
Access Restriction Bypass

<0:2.6.32-504.30.3.el6
  • H
Information Exposure

<0:2.6.32-504.23.4.el6
  • H
CVE-2014-9585

<0:2.6.32-504.23.4.el6
  • H
Resource Management Errors

<0:2.6.32-504.23.4.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.16.2.el6
  • H
Out-of-Bounds

<0:2.6.32-504.23.4.el6
  • H
Code

<0:2.6.32-504.23.4.el6
  • H
Race Condition

<0:2.6.32-504.16.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.16.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.16.2.el6
  • H
CVE-2015-1421

<0:2.6.32-504.16.2.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.23.4.el6
  • H
Out-of-Bounds

<0:2.6.32-504.12.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.12.2.el6
  • H
Resource Exhaustion

<0:2.6.32-504.16.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.16.2.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Out-of-bounds Read

<0:2.6.32-504.16.2.el6
  • M
Information Exposure

<0:2.6.32-573.el6
  • H
Out-of-Bounds

<0:2.6.32-504.16.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.8.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.12.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.3.3.el6
  • H
Improper Privilege Management

<0:2.6.32-504.3.3.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.8.1.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • M
Out-of-Bounds

<0:2.6.32-573.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Resource Exhaustion

<0:2.6.32-504.3.3.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
Out-of-Bounds

<0:2.6.32-504.1.3.el6
  • H
CVE-2014-3646

<0:2.6.32-504.1.3.el6
  • H
Race Condition

<0:2.6.32-504.1.3.el6
  • H
Improper Input Validation

<0:2.6.32-504.1.3.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.el6
  • H
Resource Exhaustion

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Link Following

<0:2.6.32-504.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Out-of-Bounds

<0:2.6.32-431.29.2.el6
  • H
Information Exposure

<0:2.6.32-431.29.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.29.2.el6
  • H
CVE-2014-4667

<0:2.6.32-431.29.2.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.el6
  • H
Improper Input Validation

<0:2.6.32-431.23.3.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
Improper Privilege Management

<0:2.6.32-431.20.5.el6
  • H
Race Condition

<0:2.6.32-431.20.5.el6
  • H
Numeric Errors

<0:2.6.32-431.20.3.el6
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
CVE-2014-3153

<0:2.6.32-431.20.3.el6
  • H
Out-of-bounds Read

<0:2.6.32-431.23.3.el6
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
Use After Free

<0:2.6.32-431.20.3.el6
  • H
Use After Free

<0:2.6.32-431.23.3.el6
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.32-431.20.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
Information Exposure

<0:2.6.32-431.20.3.el6
  • H
Out-of-bounds Write

<0:2.6.32-431.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.17.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.11.2.el6
  • H
CVE-2014-0055

<0:2.6.32-431.11.2.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.5.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.5.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
Numeric Errors

<0:2.6.32-431.1.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.1.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.1.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Resource Management Errors

<0:2.6.32-431.el6
  • H
Use of Externally-Controlled Format String

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Improper Input Validation

<0:2.6.32-431.el6
  • H
CVE-2013-0343

<0:2.6.32-431.el6
  • H
Numeric Errors

<0:2.6.32-431.el6
  • H
Resource Management Errors

<0:2.6.32-431.1.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6