Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-162.12.1?arch=el9_1 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2s15-39et-qyar
Aliases: CVE-2022-2964 |
kernel: memory corruption in AX88179_178A based USB ethernet device. | There are no reported fixed by versions. |
|
VCID-6mr9-dybm-y7cg
Aliases: CVE-2022-4139 |
kernel: i915: Incorrect GPU TLB flush can lead to random memory access | There are no reported fixed by versions. |
|
VCID-9mam-pneh-5yhy
Aliases: CVE-2022-43945 |
kernel: nfsd buffer overflow by RPC message over TCP with garbage data | There are no reported fixed by versions. |
|
VCID-cewe-299n-sbfz
Aliases: CVE-2022-3077 |
kernel: i2c: unbounded length leads to buffer overflow in ismt_access() | There are no reported fixed by versions. |
|
VCID-g5ce-cbh7-w7c8
Aliases: CVE-2022-50054 |
kernel: iavf: Fix NULL pointer dereference in iavf_get_link_ksettings | There are no reported fixed by versions. |
|
VCID-sxuq-3azc-fqa2
Aliases: CVE-2022-50053 |
kernel: iavf: Fix reset error handling | There are no reported fixed by versions. |
|
VCID-wcxk-yf59-c3h2
Aliases: CVE-2022-30594 |
kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option | There are no reported fixed by versions. |
|
VCID-zt83-99kn-zkab
Aliases: CVE-2022-2959 |
kernel: watch queue race condition can lead to privilege escalation | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||