Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-362.13.1?arch=el9_3 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-b7em-hmb3-4yhp
Aliases: CVE-2023-45871 |
kernel: IGB driver inadequate buffer size for frames larger than MTU | There are no reported fixed by versions. |
|
VCID-ejbt-betu-tuaw
Aliases: CVE-2023-20569 XSA-434 |
x86/AMD: Speculative Return Stack Overflow | There are no reported fixed by versions. |
|
VCID-ejyg-b2cr-73gc
Aliases: CVE-2023-53996 |
kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages | There are no reported fixed by versions. |
|
VCID-fm9q-u17m-dqbu
Aliases: CVE-2023-53657 |
kernel: ice: Don't tx before switchdev is fully configured | There are no reported fixed by versions. |
|
VCID-hctp-1qet-vqdp
Aliases: CVE-2023-54170 |
kernel: keys: Fix linking a duplicate key to a keyring's assoc_array | There are no reported fixed by versions. |
|
VCID-hxjx-3the-x3ff
Aliases: CVE-2023-1192 |
kernel: use-after-free in smb2_is_status_io_timeout() | There are no reported fixed by versions. |
|
VCID-sqn8-7syw-e7gb
Aliases: CVE-2023-5345 |
kernel: use-after-free vulnerability in the smb client component | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||