| Version | |
|---|---|
| orun.0.0.1 (latest) |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-28796 | 4/8/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-2873 | 8/22/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-28390 | 4/3/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-28389 | 4/3/2022 |
| linux-headers | orun.0.0.1 | n/a | Medium | CVE-2022-28388 | 4/3/2022 |
| linux-headers | orun.0.0.1 | n/a | Medium | CVE-2022-28356 | 4/2/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-27950 | 3/28/2022 |
| linux-headers | orun.0.0.1 | Linux Kernel | Medium | CVE-2022-2785 - Arbitrary Memory read in BPF Linux Kernel | 9/23/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-27666 | 3/23/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-27223 | 3/15/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-26966 | 3/12/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-26878 | 3/11/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-26490 | 3/6/2022 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-2639 | 9/1/2022 |
| linux-headers | orun.0.0.1 | Xen | Unknown | CVE-2022-26365 | 7/5/2022 |
| linux-headers | orun.0.0.1 | Linux | Unknown | CVE-2022-26365 | 7/5/2022 |
| linux-headers | orun.0.0.1 | The Linux Kernel Organization | Medium | CVE-2022-2602 | 1/8/2024 |
| linux-headers | orun.0.0.1 | n/a | Unknown | CVE-2022-2590 | 8/31/2022 |
| linux-headers | orun.0.0.1 | The Linux Kernel Organization | Medium | CVE-2022-2588 | 1/8/2024 |
| linux-headers | orun.0.0.1 | The Linux Kernel Organization | Medium | CVE-2022-2586 | 1/8/2024 |