Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-372.80.1?arch=el8_6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-225u-cxd6-dqb5
Aliases: CVE-2022-50274 |
kernel: media: dvbdev: adopts refcnt to avoid UAF | There are no reported fixed by versions. |
|
VCID-ed7y-vzk5-53bs
Aliases: CVE-2022-45919 |
kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c | There are no reported fixed by versions. |
|
VCID-fzyb-pezt-bkbt
Aliases: CVE-2022-45884 |
kernel: use-after-free due to race condition occurring in dvb_register_device() | There are no reported fixed by versions. |
|
VCID-j6td-3edb-rugg
Aliases: CVE-2023-3776 |
kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function | There are no reported fixed by versions. |
|
VCID-kz9r-zumw-5ydf
Aliases: CVE-2023-3609 |
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails | There are no reported fixed by versions. |
|
VCID-nsv2-4qub-93dd
Aliases: CVE-2022-50243 |
kernel: sctp: handle the error returned from sctp_auth_asoc_init_active_key | There are no reported fixed by versions. |
|
VCID-pq7v-b14b-tuhv
Aliases: CVE-2023-2177 |
Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common | There are no reported fixed by versions. |
|
VCID-srrf-b9jk-5uge
Aliases: CVE-2022-45886 |
kernel: use-after-free due to race condition occurring in dvb_net.c | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||