Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-193.87.1?arch=el8_2 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3wju-yesf-fbeu
Aliases: CVE-2021-47435 |
kernel: dm: fix mempool NULL pointer race when completing IO | There are no reported fixed by versions. |
|
VCID-5c6z-1ebs-wfev
Aliases: CVE-2022-1012 |
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak | There are no reported fixed by versions. |
|
VCID-5xtu-e6dr-97hb
Aliases: CVE-2022-1966 |
kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) | There are no reported fixed by versions. |
|
VCID-gkac-yybb-pqdv
Aliases: CVE-2022-32250 |
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | There are no reported fixed by versions. |
|
VCID-qecv-tvzh-8uat
Aliases: CVE-2020-29368 |
kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check | There are no reported fixed by versions. |
|
VCID-qfza-xn49-hyf1
Aliases: CVE-2022-1729 |
kernel: race condition in perf_event_open leads to privilege escalation | There are no reported fixed by versions. |
|
VCID-qr9t-hvpr-17dd
Aliases: CVE-2022-27666 |
kernel: buffer overflow in IPsec ESP transformation code | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||