| Version | |
|---|---|
| rawlink.2.1 (latest) | |
| rawlink.1.2 | |
| rawlink.1.0 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | rawlink.1.0 | n/a | Unknown | CVE-2022-1158 | 8/5/2022 |
| linux-headers | rawlink.1.2 | n/a | Unknown | CVE-2022-1158 | 8/5/2022 |
| linux-headers | rawlink.2.1 | n/a | Unknown | CVE-2022-1158 | 8/5/2022 |
| linux-headers | rawlink.1.2 | Linux | High | CVE-2022-1116 | 5/17/2022 |
| linux-headers | rawlink.2.1 | Linux | High | CVE-2022-1116 | 5/17/2022 |
| linux-headers | rawlink.1.0 | Linux | High | CVE-2022-1116 | 5/17/2022 |
| linux-headers | rawlink.1.0 | Linux | High | CVE-2022-1055 - Use after Free in tc_new_tfilter allowing for privilege escalation in Linux Kernel | 3/29/2022 |
| linux-headers | rawlink.1.2 | Linux | High | CVE-2022-1055 - Use after Free in tc_new_tfilter allowing for privilege escalation in Linux Kernel | 3/29/2022 |
| linux-headers | rawlink.2.1 | Linux | High | CVE-2022-1055 - Use after Free in tc_new_tfilter allowing for privilege escalation in Linux Kernel | 3/29/2022 |
| linux-headers | rawlink.1.2 | n/a | Unknown | CVE-2022-1048 | 4/29/2022 |
| linux-headers | rawlink.1.0 | n/a | Unknown | CVE-2022-1048 | 4/29/2022 |
| linux-headers | rawlink.2.1 | n/a | Unknown | CVE-2022-1048 | 4/29/2022 |
| linux-headers | rawlink.1.2 | n/a | Unknown | CVE-2022-1043 | 8/29/2022 |
| linux-headers | rawlink.2.1 | n/a | Unknown | CVE-2022-1043 | 8/29/2022 |
| linux-headers | rawlink.1.0 | n/a | Unknown | CVE-2022-1043 | 8/29/2022 |
| linux-headers | rawlink.1.0 | n/a | Unknown | CVE-2022-1016 | 8/29/2022 |
| linux-headers | rawlink.2.1 | n/a | Unknown | CVE-2022-1016 | 8/29/2022 |
| linux-headers | rawlink.1.2 | n/a | Unknown | CVE-2022-1016 | 8/29/2022 |
| linux-headers | rawlink.1.2 | n/a | Unknown | CVE-2022-1015 | 4/29/2022 |
| linux-headers | rawlink.1.0 | n/a | Unknown | CVE-2022-1015 | 4/29/2022 |