python-perf vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-perf package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

<0:2.6.32-754.53.1.el6
  • H
Use After Free

<0:2.6.32-754.53.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.53.1.el6
  • H
Use After Free

<0:2.6.32-754.53.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.35.1.0.10.el6
  • H
ELSA-2018-0512

<0:2.6.32-696.23.1.el6
  • H
ELSA-2017-0892-1

<0:2.6.32-696.1.1.0.1.el6
  • M
CVE-2021-26401

<0:2.6.32-754.49.1.el6
  • H
Missing Authorization

<0:2.6.32-754.35.1.0.6.el6
  • H
Race Condition

<0:2.6.32-754.35.1.0.6.el6
  • H
Incorrect Calculation of Buffer Size

<0:2.6.32-754.35.1.0.6.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.7.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.35.1.0.4.el6
  • H
Race Condition

<0:2.6.32-754.35.1.0.7.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.35.1.0.5.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.5.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.8.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.35.1.0.3.el6
  • H
Out-of-bounds Read

<0:2.6.32-754.35.1.0.3.el6
  • H
Memory Leak

<0:2.6.32-754.35.1.0.3.el6
  • H
Use After Free

<0:2.6.32-754.35.1.0.3.el6
  • H
Numeric Errors

<0:2.6.32-754.35.1.0.2.el6
  • H
Heap-based Buffer Overflow

<0:2.6.32-754.33.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.29.2.el6
  • H
CVE-2017-1000371

<0:2.6.32-754.29.1.el6
  • M
Information Exposure

<0:2.6.32-754.31.1.el6
  • H
Buffer Overflow

<0:2.6.32-754.28.1.el6
  • H
Buffer Overflow

<0:2.6.32-754.29.1.el6
  • H
Missing Authorization

<0:2.6.32-754.28.1.el6
  • H
CVE-2019-0155

<0:2.6.32-754.24.3.el6
  • H
CVE-2019-0154

<0:2.6.32-754.24.2.el6
  • H
Improper Input Validation

<0:2.6.32-754.24.2.el6
  • H
CVE-2019-11135

<0:2.6.32-754.24.2.el6
  • H
Out-of-bounds Write

<0:2.6.32-754.25.1.el6
  • H
Buffer Overflow

<0:2.6.32-754.23.1.el6
  • H
Use After Free

<0:2.6.32-754.35.1.el6
  • H
CVE-2019-1125

<0:2.6.32-754.18.2.el6
  • H
Cleartext Transmission of Sensitive Information

<0:2.6.32-754.18.2.el6
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-754.24.2.el6
  • H
Use After Free

<0:2.6.32-754.22.1.el6
  • H
Use After Free

<0:2.6.32-754.15.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.15.3.el6
  • H
Allocation of Resources Without Limits or Throttling

<0:2.6.32-754.15.3.el6
  • H
Resource Exhaustion

<0:2.6.32-754.15.3.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
CVE-2019-11091

<0:2.6.32-754.14.2.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
Information Exposure

<0:2.6.32-754.14.2.el6
  • H
Incorrect Type Conversion or Cast

<0:2.6.32-754.22.1.el6
  • H
Race Condition

<0:2.6.32-754.18.2.el6
  • H
Use After Free

<0:2.6.32-754.11.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.18.2.el6
  • H
Improper Privilege Management

<0:2.6.32-754.12.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.6.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.6.3.el6
  • H
CVE-2018-10901

<0:2.6.32-754.3.5.el6
  • H
Information Exposure

<0:2.6.32-754.3.5.el6
  • H
CVE-2018-3646

<0:2.6.32-754.3.5.el6
  • H
Out-of-Bounds

<0:2.6.32-754.3.5.el6
  • H
CVE-2018-3693

<0:2.6.32-754.3.5.el6
  • H
Use After Free

<0:2.6.32-754.3.5.el6
  • H
Resource Exhaustion

<0:2.6.32-754.3.5.el6
  • H
Execution with Unnecessary Privileges

<0:2.6.32-754.2.1.el6
  • H
Use After Free

<0:2.6.32-754.2.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
CVE-2015-8830

<0:2.6.32-754.el6
  • H
Information Exposure

<0:2.6.32-754.2.1.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-754.el6
  • H
Information Exposure

<0:2.6.32-696.30.1.el6
  • H
Race Condition

<0:2.6.32-696.28.1.el6
  • H
Information Exposure

<0:2.6.32-696.28.1.el6
  • H
Use After Free

<0:2.6.32-696.28.1.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-754.3.5.el6
  • H
Out-of-bounds Write

<0:2.6.32-696.28.1.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
Use After Free

<0:2.6.32-696.28.1.el6
  • H
Information Exposure

<0:2.6.32-696.18.7.el6
  • H
Information Exposure

<0:2.6.32-696.18.7.el6
  • H
Information Exposure

<0:2.6.32-696.18.7.el6
  • H
Resource Exhaustion

<0:2.6.32-754.el6
  • M
NULL Pointer Dereference

<0:2.6.32-754.30.2.el6
  • H
Divide By Zero

<0:2.6.32-696.16.1.el6
  • H
Out-of-bounds Write

<0:2.6.32-696.16.1.el6
  • H
Race Condition

<0:2.6.32-696.16.1.el6
  • H
Use After Free

<0:2.6.32-696.20.1.el6
  • M
Out-of-Bounds

<0:2.6.32-696.13.2.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-696.20.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.10.3.el6
  • H
Out-of-bounds Write

<0:2.6.32-696.10.2.el6
  • H
CVE-2017-2671

<0:2.6.32-754.el6
  • H
Race Condition

<0:2.6.32-754.el6
  • H
CVE-2017-9075

<0:2.6.32-754.el6
  • H
NULL Pointer Dereference

<0:2.6.32-754.33.1.el6
  • H
CVE-2017-9076

<0:2.6.32-754.el6
  • H
Double Free

<0:2.6.32-754.el6
  • H
Error Handling

<0:2.6.32-754.el6
  • H
CVE-2017-9077

<0:2.6.32-754.el6
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.6.32-754.el6
  • H
Out-of-bounds Read

<0:2.6.32-696.20.1.el6
  • H
Improper Input Validation

<0:2.6.32-696.28.1.el6
  • H
Out-of-Bounds

<0:2.6.32-696.6.3.el6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.6.32-696.3.1.el6
  • H
Incorrect Conversion between Numeric Types

<0:2.6.32-754.el6
  • H
Out-of-Bounds

<0:2.6.32-696.3.2.el6
  • M
Improper Authorization

<0:2.6.32-696.el6
  • M
Improper Access Control

<0:2.6.32-696.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • H
Use After Free

<0:2.6.32-696.1.1.el6
  • M
Code

<0:2.6.32-696.el6
  • M
Out-of-Bounds

<0:2.6.32-696.el6
  • H
Race Condition

<0:2.6.32-696.1.1.el6
  • M
Use After Free

<0:2.6.32-696.el6
  • H
Double Free

<0:2.6.32-642.13.2.el6
  • H
Use After Free

<0:2.6.32-642.13.1.el6
  • H
Improper Input Validation

<0:2.6.32-754.el6
  • M
Out-of-bounds Read

<0:2.6.32-642.15.1.el6
  • H
Improper Data Handling

<0:2.6.32-642.13.1.el6
  • M
Race Condition

<0:2.6.32-642.15.1.el6
  • M
CVE-2016-2384

<0:2.6.32-696.el6
  • M
Race Condition

<0:2.6.32-696.el6
  • M
Race Condition

<0:2.6.32-696.el6
  • H
Race Condition

<0:2.6.32-642.6.2.el6
  • H
Out-of-Bounds

<0:2.6.32-642.11.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-642.13.1.el6
  • H
Information Exposure

<0:2.6.32-642.4.2.el6
  • H
Improper Input Validation

<0:2.6.32-642.11.1.el6
  • H
CVE-2016-4470

<0:2.6.32-642.6.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-642.3.1.el6
  • M
CVE-2015-8324

<0:2.6.32-642.el6
  • M
CVE-2015-8543

<0:2.6.32-642.el6
  • M
Out-of-Bounds

<0:2.6.32-642.el6
  • M
Improper Input Validation

<0:2.6.32-642.el6
  • M
Improper Input Validation

<0:2.6.32-642.el6
  • M
Race Condition

<0:2.6.32-573.26.1.el6
  • M
Improper Input Validation

<0:2.6.32-573.22.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-573.26.1.el6
  • M
CVE-2014-8134

<0:2.6.32-642.el6
  • H
Improper Input Validation

<0:2.6.32-573.12.1.el6
  • H
Resource Management Errors

<0:2.6.32-573.12.1.el6
  • H
Resource Management Errors

<0:2.6.32-573.12.1.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • H
Race Condition

<0:2.6.32-573.12.1.el6
  • M
Race Condition

<0:2.6.32-642.el6
  • H
CVE-2015-2925

<0:2.6.32-573.12.1.el6
  • M
Out-of-Bounds

<0:2.6.32-642.el6
  • H
Resource Management Errors

<0:2.6.32-573.3.1.el6
  • H
Resource Management Errors

<0:2.6.32-573.3.1.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • M
Numeric Errors

<0:2.6.32-573.el6
  • M
Improper Privilege Management

<0:2.6.32-573.el6
  • M
Access Restriction Bypass

<0:2.6.32-573.el6
  • M
Code

<0:2.6.32-504.30.3.el6
  • M
CVE-2011-5321

<0:2.6.32-504.30.3.el6
  • M
CVE-2015-3636

<0:2.6.32-504.30.3.el6
  • M
Access Restriction Bypass

<0:2.6.32-504.30.3.el6
  • M
Access Restriction Bypass

<0:2.6.32-504.30.3.el6
  • H
Information Exposure

<0:2.6.32-504.23.4.el6
  • H
CVE-2014-9585

<0:2.6.32-504.23.4.el6
  • H
Resource Management Errors

<0:2.6.32-504.23.4.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.16.2.el6
  • H
Out-of-Bounds

<0:2.6.32-504.23.4.el6
  • H
Code

<0:2.6.32-504.23.4.el6
  • H
Race Condition

<0:2.6.32-504.16.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.16.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.16.2.el6
  • H
CVE-2015-1421

<0:2.6.32-504.16.2.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.23.4.el6
  • H
Out-of-Bounds

<0:2.6.32-504.12.2.el6
  • H
Improper Input Validation

<0:2.6.32-504.12.2.el6
  • H
Resource Exhaustion

<0:2.6.32-504.16.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.16.2.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • H
Out-of-bounds Read

<0:2.6.32-504.16.2.el6
  • M
Information Exposure

<0:2.6.32-573.el6
  • H
Out-of-Bounds

<0:2.6.32-504.16.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.8.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.12.2.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.3.3.el6
  • H
Improper Privilege Management

<0:2.6.32-504.3.3.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.8.1.el6
  • M
Race Condition

<0:2.6.32-573.el6
  • M
Out-of-Bounds

<0:2.6.32-573.el6
  • H
Resource Management Errors

<0:2.6.32-504.3.3.el6
  • H
Resource Exhaustion

<0:2.6.32-504.3.3.el6
  • H
Improper Input Validation

<0:2.6.32-504.3.3.el6
  • H
Out-of-Bounds

<0:2.6.32-504.1.3.el6
  • H
CVE-2014-3646

<0:2.6.32-504.1.3.el6
  • H
Race Condition

<0:2.6.32-504.1.3.el6
  • H
Improper Input Validation

<0:2.6.32-504.1.3.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
NULL Pointer Dereference

<0:2.6.32-504.el6
  • H
Resource Exhaustion

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Link Following

<0:2.6.32-504.el6
  • H
Use After Free

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-504.el6
  • H
Out-of-Bounds

<0:2.6.32-431.29.2.el6
  • H
Information Exposure

<0:2.6.32-431.29.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.29.2.el6
  • H
CVE-2014-4667

<0:2.6.32-431.29.2.el6
  • H
Access Restriction Bypass

<0:2.6.32-504.el6
  • H
Improper Input Validation

<0:2.6.32-431.23.3.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
Race Condition

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
Improper Privilege Management

<0:2.6.32-431.20.5.el6
  • H
Race Condition

<0:2.6.32-431.20.5.el6
  • H
Numeric Errors

<0:2.6.32-431.20.3.el6
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
CVE-2014-3153

<0:2.6.32-431.20.3.el6
  • H
Out-of-bounds Read

<0:2.6.32-431.23.3.el6
  • H
Improper Input Validation

<0:2.6.32-431.20.3.el6
  • H
Use After Free

<0:2.6.32-431.20.3.el6
  • H
Use After Free

<0:2.6.32-431.23.3.el6
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.32-431.20.3.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-431.23.3.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.23.3.el6
  • H
Information Exposure

<0:2.6.32-431.20.3.el6
  • H
Out-of-bounds Write

<0:2.6.32-431.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.17.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
NULL Pointer Dereference

<0:2.6.32-431.11.2.el6
  • H
CVE-2014-0055

<0:2.6.32-431.11.2.el6
  • H
Numeric Errors

<0:2.6.32-504.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.17.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Improper Input Validation

<0:2.6.32-431.5.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.5.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.5.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.11.2.el6
  • H
Numeric Errors

<0:2.6.32-431.1.2.el6
  • H
Improper Input Validation

<0:2.6.32-431.1.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Access Restriction Bypass

<0:2.6.32-431.1.2.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Resource Management Errors

<0:2.6.32-431.el6
  • H
Use of Externally-Controlled Format String

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
Improper Input Validation

<0:2.6.32-431.el6
  • H
CVE-2013-0343

<0:2.6.32-431.el6
  • H
Numeric Errors

<0:2.6.32-431.el6
  • M
Information Exposure

<0:2.6.32-358.23.2.el6
  • H
Resource Management Errors

<0:2.6.32-431.1.2.el6
  • M
Resource Management Errors

<0:2.6.32-358.23.2.el6
  • H
Improper Input Validation

<0:2.6.32-358.18.1.el6
  • H
CVE-2013-2224

<0:2.6.32-358.18.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • H
CVE-2013-2206

<0:2.6.32-358.18.1.el6
  • H
Improper Input Validation

<0:2.6.32-358.18.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.18.1.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • M
Resource Management Errors

<0:2.6.32-358.14.1.el6
  • M
Improper Input Validation

<0:2.6.32-358.14.1.el6
  • M
CVE-2013-3301

<0:2.6.32-358.14.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • M
Resource Exhaustion

<0:2.6.32-358.14.1.el6
  • M
Use of Externally-Controlled Format String

<0:2.6.32-358.14.1.el6
  • M
Resource Management Errors

<0:2.6.32-358.14.1.el6
  • H
Out-of-Bounds

<0:2.6.32-431.el6
  • M
Access Restriction Bypass

<0:2.6.32-358.14.1.el6
  • H
Information Exposure

<0:2.6.32-358.18.1.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • M
Information Exposure

<0:2.6.32-358.14.1.el6
  • H
Resource Management Errors

<0:2.6.32-358.11.1.el6
  • H
Numeric Errors

<0:2.6.32-358.6.2.el6
  • H
Improper Input Validation

<0:2.6.32-358.11.1.el6
  • H
Race Condition

<0:2.6.32-358.11.1.el6
  • H
Numeric Errors

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-431.el6
  • H
Access Restriction Bypass

<0:2.6.32-358.6.1.el6
  • H
Resource Management Errors

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.6.1.el6
  • H
Information Exposure

<0:2.6.32-358.6.1.el6
  • H
Resource Management Errors

<0:2.6.32-358.6.1.el6
  • H
Race Condition

<0:2.6.32-358.6.1.el6
  • H
CVE-2013-1827

<0:2.6.32-358.6.1.el6
  • H
Out-of-Bounds

<0:2.6.32-358.6.1.el6
  • H
CVE-2013-1826

<0:2.6.32-358.6.1.el6
  • H
Improper Input Validation

<0:2.6.32-358.6.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-358.2.1.el6
  • H
Numeric Errors

<0:2.6.32-358.2.1.el6
  • H
Race Condition

<0:2.6.32-358.0.1.el6
  • H
CVE-2013-0311

<0:2.6.32-358.el6
  • H
Improper Input Validation

<0:2.6.32-358.el6
  • H
Out-of-Bounds

<0:2.6.32-358.el6
  • H
Access Restriction Bypass

<0:2.6.32-358.el6
  • H
Out-of-Bounds

<0:2.6.32-358.el6
  • M
Information Exposure

<0:2.6.32-279.22.1.el6
  • M
CVE-2012-4461

<0:2.6.32-279.22.1.el6
  • M
Improper Input Validation

<0:2.6.32-279.22.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • M
CVE-2012-5517

<0:2.6.32-279.19.1.el6
  • M
CVE-2012-4444

<0:2.6.32-279.19.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • H
Race Condition

<0:2.6.32-358.el6
  • M
Out-of-bounds Write

<0:2.6.32-279.14.1.el6
  • M
CVE-2012-1568

<0:2.6.32-279.14.1.el6
  • M
Numeric Errors

<0:2.6.32-279.19.1.el6
  • M
Resource Management Errors

<0:2.6.32-279.14.1.el6
  • M
Race Condition

<0:2.6.32-279.14.1.el6
  • M
Numeric Errors

<0:2.6.32-279.9.1.el6
  • H
Numeric Errors

<0:2.6.32-279.11.1.el6
  • M
Resource Management Errors

<0:2.6.32-279.9.1.el6
  • M
Race Condition

<0:2.6.32-279.9.1.el6
  • M
Information Exposure

<0:2.6.32-279.9.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-279.9.1.el6
  • M
Numeric Errors

<0:2.6.32-279.5.1.el6
  • H
Out-of-Bounds

<0:2.6.32-279.1.1.el6
  • H
CVE-2012-2744

<0:2.6.32-279.1.1.el6
  • M
Numeric Errors

<0:2.6.32-279.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • H
Out-of-Bounds

<0:2.6.32-220.23.1.el6
  • H
Out-of-Bounds

<0:2.6.32-220.23.1.el6
  • H
Integer Overflow or Wraparound

<0:2.6.32-220.23.1.el6
  • H
CVE-2012-2372

<0:2.6.32-220.23.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • H
Race Condition

<0:2.6.32-220.23.1.el6
  • H
Improper Input Validation

<0:2.6.32-220.23.1.el6
  • M
Resource Management Errors

<0:2.6.32-220.17.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.23.1.el6
  • M
Improper Input Validation

<0:2.6.32-220.13.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.13.1.el6
  • M
Resource Exhaustion

<0:2.6.32-220.13.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.7.1.el6
  • M
CVE-2012-0045

<0:2.6.32-220.7.1.el6
  • M
Numeric Errors

<0:2.6.32-220.7.1.el6
  • M
Integer Overflow or Wraparound

<0:2.6.32-220.7.1.el6
  • M
NULL Pointer Dereference

<0:2.6.32-220.7.1.el6
  • M
Access Restriction Bypass

<0:2.6.32-220.7.1.el6
  • M
Resource Exhaustion

<0:2.6.32-279.el6
  • M
CVE-2011-4622

<0:2.6.32-220.7.1.el6
  • M
Out-of-Bounds

<0:2.6.32-220.17.1.el6
  • M
Divide By Zero

<0:2.6.32-220.7.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.4.1.el6
  • M
Improper Input Validation

<0:2.6.32-220.7.1.el6
  • M
Out-of-Bounds

<0:2.6.32-220.7.1.el6
  • H
Access Restriction Bypass

<0:2.6.32-220.2.1.el6
  • M
CVE-2011-3638

<0:2.6.32-220.el6
  • M
Access Restriction Bypass

<0:2.6.32-220.el6
  • M
Information Exposure

<0:2.6.32-220.el6
  • M
CVE-2011-3347

<0:2.6.32-220.el6
  • M
Information Exposure

<0:2.6.32-279.5.1.el6