| Version | |
|---|---|
| rawlink-lwt.2.1 (latest) |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-30456 | 4/10/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-3022 | 6/19/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-3006 | 5/31/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-2985 | 6/1/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-28866 | 3/27/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-28772 | 3/23/2023 |
| linux-headers | rawlink-lwt.2.1 | Fedora | Medium | CVE-2023-2860 - Out-of-bounds read when setting hmac data | 7/24/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-2860 - Out-of-bounds read when setting hmac data | 7/24/2023 |
| linux-headers | rawlink-lwt.2.1 | Red Hat | Medium | CVE-2023-2860 - Out-of-bounds read when setting hmac data | 7/24/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | High | CVE-2023-28466 | 3/15/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Unknown | CVE-2023-28464 | 3/31/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-28328 | 4/19/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-28327 | 4/19/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | High | CVE-2023-26607 | 2/26/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | High | CVE-2023-26606 | 2/26/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | High | CVE-2023-26605 | 2/26/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | Medium | CVE-2023-26545 | 2/25/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | High | CVE-2023-26544 | 2/25/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | High | CVE-2023-26242 | 2/21/2023 |
| linux-headers | rawlink-lwt.2.1 | n/a | High | CVE-2023-2598 | 6/1/2023 |