kernel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Information Exposure

<0:2.6.18-430.el5
  • H
Use After Free

*
  • L
Use After Free

*
  • L
Improper Cleanup on Thrown Exception

*
  • L
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • H
Race Condition

<0:2.6.18-238.57.1.el5
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • L
Information Exposure

*
  • L
External Initialization of Trusted Variables or Data Stores

*
  • M
Arbitrary Code Injection

*
  • M
Insufficient Comparison

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

<0:2.4.21-66.EL
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • H
Numeric Errors

<0:2.4.21-66.EL
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • H
Out-of-Bounds

<0:2.6.18-420.el5
  • M
Use After Free

*
  • M
Out-of-bounds Write

*
  • M
Resource Exhaustion

*
  • H
Out-of-Bounds

<0:2.6.18-423.el5
  • L
CVE-2017-1000379

<0:2.6.18-420.el5
  • H
Out-of-bounds Read

<0:2.6.18-422.el5
  • H
Use After Free

<0:2.6.18-238.58.1.el5
  • M
NULL Pointer Dereference

<0:2.6.18-238.58.1.el5
  • L
Information Exposure

*
  • H
Heap-based Buffer Overflow

<0:2.6.18-438.el5
  • M
Divide By Zero

<0:2.6.18-433.el5
  • M
Use After Free

<0:2.6.18-436.el5
  • H
Use After Free

<0:2.6.18-436.el5
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • M
Use After Free

<0:2.6.18-436.el5
  • M
Execution with Unnecessary Privileges

<0:2.6.18-431.el5
  • H
Information Exposure

<0:2.6.18-434.el5
  • H
Information Exposure

<0:2.6.18-433.el5
  • H
Information Exposure

<0:2.6.18-434.el5
  • H
Information Exposure

<0:2.6.18-426.el5
  • H
Information Exposure

<0:2.6.18-426.el5
  • M
Memory Leak

*
  • H
Information Exposure

<0:2.6.18-439.el5
  • L
Resource Exhaustion

*
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • H
Out-of-Bounds

<0:2.4.21-66.EL
  • H
Information Exposure

<0:2.6.18-238.53.1.el5
  • H
Improper Check for Unusual or Exceptional Conditions

<0:2.6.18-238.53.1.el5
  • H
Improper Enforcement of Behavioral Workflow

<0:2.6.18-238.54.1.el5
  • H
Improper Enforcement of Behavioral Workflow

<0:2.6.9-106.EL
  • H
Code

<0:2.6.18-238.56.1.el5
  • M
Numeric Errors

<0:2.6.18-128.36.1.el5
  • M
Out-of-bounds Write

*
  • H
Integer Overflow or Wraparound

<0:2.6.18-238.55.1.el5
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Incorrect Permission Assignment for Critical Resource

*
  • M
Time-of-check Time-of-use (TOCTOU)

*