The flaws could lead to denial-of-service attacks, information disclosure, privilege escalation, and in some cases, code execution.