| Version | |
|---|---|
| rawlink.2.1 (latest) | |
| rawlink.1.2 | |
| rawlink.1.0 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | rawlink.1.0 | n/a | High | CVE-2023-2598 | 6/1/2023 |
| linux-headers | rawlink.1.2 | n/a | High | CVE-2023-2598 | 6/1/2023 |
| linux-headers | rawlink.2.1 | n/a | High | CVE-2023-2598 | 6/1/2023 |
| linux-headers | rawlink.1.2 | n/a | Medium | CVE-2023-2513 | 5/8/2023 |
| linux-headers | rawlink.1.0 | n/a | Medium | CVE-2023-2513 | 5/8/2023 |
| linux-headers | rawlink.2.1 | n/a | Medium | CVE-2023-2513 | 5/8/2023 |
| linux-headers | rawlink.1.0 | n/a | Medium | CVE-2023-25012 | 2/1/2023 |
| linux-headers | rawlink.1.2 | n/a | Medium | CVE-2023-25012 | 2/1/2023 |
| linux-headers | rawlink.2.1 | n/a | Medium | CVE-2023-25012 | 2/1/2023 |
| linux-headers | rawlink.1.0 | n/a | Medium | CVE-2023-2430 | 7/23/2023 |
| linux-headers | rawlink.1.2 | n/a | Medium | CVE-2023-2430 | 7/23/2023 |
| linux-headers | rawlink.2.1 | n/a | Medium | CVE-2023-2430 | 7/23/2023 |
| linux-headers | rawlink.2.1 | Linux | Medium | CVE-2023-23586 - Use after free in io_uring in the Linux Kernel | 2/17/2023 |
| linux-headers | rawlink.1.0 | Linux | Medium | CVE-2023-23586 - Use after free in io_uring in the Linux Kernel | 2/17/2023 |
| linux-headers | rawlink.1.2 | Linux | Medium | CVE-2023-23586 - Use after free in io_uring in the Linux Kernel | 2/17/2023 |
| linux-headers | rawlink.1.2 | n/a | High | CVE-2023-23559 | 1/13/2023 |
| linux-headers | rawlink.2.1 | n/a | High | CVE-2023-23559 | 1/13/2023 |
| linux-headers | rawlink.1.0 | n/a | High | CVE-2023-23559 | 1/13/2023 |
| linux-headers | rawlink.1.0 | n/a | Medium | CVE-2023-23455 | 1/12/2023 |
| linux-headers | rawlink.1.2 | n/a | Medium | CVE-2023-23455 | 1/12/2023 |