Search for packages
| purl | pkg:rpm/redhat/kernel@3.10.0-1160.80.1?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2uap-2vm1-efcr
Aliases: CVE-2022-29900 |
Retbleed - arbitrary speculative code execution with return instructions | There are no reported fixed by versions. |
|
VCID-5zzw-du1s-gyf2
Aliases: CVE-2022-26373 |
hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions | There are no reported fixed by versions. |
|
VCID-kw9v-ery2-sffr
Aliases: CVE-2022-29901 |
Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution. | There are no reported fixed by versions. |
|
VCID-pmbu-dsmk-jkaw
Aliases: CVE-2022-2588 |
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation | There are no reported fixed by versions. |
|
VCID-r48g-c56n-sqdz
Aliases: CVE-2022-28693 |
hw: cpu: Intel: information disclosure via local access | There are no reported fixed by versions. |
|
VCID-t84j-7tyr-fkfy
Aliases: CVE-2022-23816 |
Retbleed - arbitrary speculative code execution with return instructions | There are no reported fixed by versions. |
|
VCID-zkyv-h5at-xkgq
Aliases: CVE-2022-23825 XSA-407 |
Retbleed - arbitrary speculative code execution with return instructions | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||