Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-70.17.1?arch=el9_0 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5c6z-1ebs-wfev
Aliases: CVE-2022-1012 |
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak | There are no reported fixed by versions. |
|
VCID-5xtu-e6dr-97hb
Aliases: CVE-2022-1966 |
kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) | There are no reported fixed by versions. |
|
VCID-gkac-yybb-pqdv
Aliases: CVE-2022-32250 |
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | There are no reported fixed by versions. |
|
VCID-n8pj-dxe6-hkc9
Aliases: CVE-2022-49044 |
kernel: dm integrity: fix memory corruption when tag_size is less than digest size | There are no reported fixed by versions. |
|
VCID-qfza-xn49-hyf1
Aliases: CVE-2022-1729 |
kernel: race condition in perf_event_open leads to privilege escalation | There are no reported fixed by versions. |
|
VCID-qr9t-hvpr-17dd
Aliases: CVE-2022-27666 |
kernel: buffer overflow in IPsec ESP transformation code | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||