Search for packages
| purl | pkg:rpm/redhat/kernel-rt@4.18.0-513.11.1.rt7.313?arch=el8_9 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-6stw-cw42-83ek
Aliases: CVE-2023-5633 |
kernel: vmwgfx: reference count issue leads to use-after-free in surface handling | There are no reported fixed by versions. |
|
VCID-ejbt-betu-tuaw
Aliases: CVE-2023-20569 XSA-434 |
x86/AMD: Speculative Return Stack Overflow | There are no reported fixed by versions. |
|
VCID-gpry-jhh3-byed
Aliases: CVE-2023-4622 |
kernel: use after free in unix_stream_sendpage | There are no reported fixed by versions. |
|
VCID-kkm1-jzbg-97d3
Aliases: CVE-2022-36402 |
kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c | There are no reported fixed by versions. |
|
VCID-mwd5-aurx-fqh8
Aliases: CVE-2023-42753 |
kernel: netfilter: potential slab-out-of-bound access due to integer underflow | There are no reported fixed by versions. |
|
VCID-ww12-xnsy-gyfm
Aliases: CVE-2023-2162 |
kernel: UAF during login when accessing the shost ipaddress | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||