Search for packages
| purl | pkg:rpm/redhat/kernel-rt@5.14.0-70.64.1.rt21.135?arch=el9_0 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4nqf-ct5y-6uev
Aliases: CVE-2022-42896 |
kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c | There are no reported fixed by versions. |
|
VCID-5pt2-wwc2-zbfy
Aliases: CVE-2022-1016 |
kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM | There are no reported fixed by versions. |
|
VCID-dqhd-grev-t3ge
Aliases: CVE-2022-42703 |
kernel: use-after-free related to leaf anon_vma double reuse | There are no reported fixed by versions. |
|
VCID-mdjx-3kwa-r7bj
Aliases: CVE-2023-2002 |
Kernel: bluetooth: Unauthorized management command execution | There are no reported fixed by versions. |
|
VCID-t7q4-3b72-u3a5
Aliases: CVE-2023-2124 |
kernel: OOB access in the Linux kernel's XFS subsystem | There are no reported fixed by versions. |
|
VCID-zsmq-81fu-q3fq
Aliases: CVE-2023-2235 |
kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||