Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-372.100.1?arch=el8_6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5rym-k4vn-nye8
Aliases: CVE-2022-1852 |
kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS | There are no reported fixed by versions. |
|
VCID-ep2r-37u6-a7ht
Aliases: CVE-2021-47099 |
kernel: veth: ensure skb entering GRO are not cloned. | There are no reported fixed by versions. |
|
VCID-ezb4-x5pv-myhe
Aliases: CVE-2021-26341 |
hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch | There are no reported fixed by versions. |
|
VCID-j8ze-t6w6-ekak
Aliases: CVE-2022-42895 |
kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c | There are no reported fixed by versions. |
|
VCID-qmdw-hcza-cycq
Aliases: CVE-2022-1184 |
kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image | There are no reported fixed by versions. |
|
VCID-wm98-kp5f-mudg
Aliases: CVE-2022-3640 |
kernel: use after free flaw in l2cap_conn_del in net/bluetooth/l2cap_core.c | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||