Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-284.18.1?arch=el9_2 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-fah9-g62s-s3h1
Aliases: CVE-2023-54325 |
kernel: crypto: qat - fix out-of-bounds read | There are no reported fixed by versions. |
|
VCID-mdjx-3kwa-r7bj
Aliases: CVE-2023-2002 |
Kernel: bluetooth: Unauthorized management command execution | There are no reported fixed by versions. |
|
VCID-p3kq-83eq-kba4
Aliases: CVE-2023-28466 |
kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference | There are no reported fixed by versions. |
|
VCID-sdd3-35ng-g7a3
Aliases: CVE-2022-41723 GHSA-vvpx-j8f3-3w6h |
golang.org/x/net vulnerable to Uncontrolled Resource Consumption A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. | There are no reported fixed by versions. |
|
VCID-t7q4-3b72-u3a5
Aliases: CVE-2023-2124 |
kernel: OOB access in the Linux kernel's XFS subsystem | There are no reported fixed by versions. |
|
VCID-uqu9-hbxy-kqeh
Aliases: CVE-2023-32233 |
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | There are no reported fixed by versions. |
|
VCID-x8ys-erbg-vkcy
Aliases: CVE-2023-2194 |
kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() | There are no reported fixed by versions. |
|
VCID-zsmq-81fu-q3fq
Aliases: CVE-2023-2235 |
kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||