Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-284.48.1?arch=el9_2 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-38ja-dsj5-qyfc
Aliases: CVE-2023-39191 |
kernel: eBPF: insufficient stack type checks in dynptr | There are no reported fixed by versions. |
|
VCID-3nwm-cb6f-vkbv
Aliases: CVE-2022-41858 |
kernel: null-ptr-deref vulnerabilities in sl_tx_timeout in drivers/net/slip | There are no reported fixed by versions. |
|
VCID-41ut-8u7g-fbhm
Aliases: CVE-2023-5717 |
kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list | There are no reported fixed by versions. |
|
VCID-67cs-sdpc-t7f1
Aliases: CVE-2023-4015 |
kernel: use after free in nft_immediate_deactivate | There are no reported fixed by versions. |
|
VCID-7bp6-cn74-ayar
Aliases: CVE-2023-52562 |
kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy() | There are no reported fixed by versions. |
|
VCID-ae5d-jmsc-9ba5
Aliases: CVE-2023-2163 |
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe | There are no reported fixed by versions. |
|
VCID-ap5s-w9uk-zff3
Aliases: CVE-2022-3545 |
kernel: nfp: use-after-free in area_cache_get() | There are no reported fixed by versions. |
|
VCID-b7em-hmb3-4yhp
Aliases: CVE-2023-45871 |
kernel: IGB driver inadequate buffer size for frames larger than MTU | There are no reported fixed by versions. |
|
VCID-ejbt-betu-tuaw
Aliases: CVE-2023-20569 XSA-434 |
x86/AMD: Speculative Return Stack Overflow | There are no reported fixed by versions. |
|
VCID-fhep-d1cx-kqh9
Aliases: CVE-2023-40283 |
kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c | There are no reported fixed by versions. |
|
VCID-gpry-jhh3-byed
Aliases: CVE-2023-4622 |
kernel: use after free in unix_stream_sendpage | There are no reported fixed by versions. |
|
VCID-hxjx-3the-x3ff
Aliases: CVE-2023-1192 |
kernel: use-after-free in smb2_is_status_io_timeout() | There are no reported fixed by versions. |
|
VCID-j2y7-nwcd-5qh7
Aliases: CVE-2023-38409 |
kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment | There are no reported fixed by versions. |
|
VCID-j4xv-b39v-kfdn
Aliases: CVE-2023-3777 |
kernel: use-after-free in netfilter: nf_tables | There are no reported fixed by versions. |
|
VCID-mxda-6yrb-ukgb
Aliases: CVE-2023-4623 |
kernel: net/sched: sch_hfsc UAF | There are no reported fixed by versions. |
|
VCID-n4y6-u53b-qufb
Aliases: CVE-2023-52942 |
kernel: cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask() | There are no reported fixed by versions. |
|
VCID-rp4r-rkvb-pfe3
Aliases: CVE-2022-50879 |
kernel: objtool: Fix SEGFAULT | There are no reported fixed by versions. |
|
VCID-sdkh-c3yd-g3ak
Aliases: CVE-2023-2176 |
kernel: Slab-out-of-bound read in compare_netdev_and_ip | There are no reported fixed by versions. |
|
VCID-shtf-mwha-z7cd
Aliases: CVE-2023-2166 |
kernel: NULL pointer dereference in can_rcv_filter | There are no reported fixed by versions. |
|
VCID-sv6b-1fxf-2ygx
Aliases: CVE-2023-52973 |
kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF | There are no reported fixed by versions. |
|
VCID-vhwk-ynks-vye3
Aliases: CVE-2023-6679 |
kernel: NULL pointer dereference in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c | There are no reported fixed by versions. |
|
VCID-ww12-xnsy-gyfm
Aliases: CVE-2023-2162 |
kernel: UAF during login when accessing the shost ipaddress | There are no reported fixed by versions. |
|
VCID-zcxw-xq7k-tkhx
Aliases: CVE-2023-46813 |
kernel: SEV-ES local priv escalation | There are no reported fixed by versions. |
|
VCID-zph7-5zjb-quae
Aliases: CVE-2023-3567 |
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||