| Version | |
|---|---|
| restricted.1.2.0 (latest) | |
| restricted.1.1 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | restricted.1.2.0 | n/a | High | CVE-2023-26607 | 2/26/2023 |
| linux-headers | restricted.1.2.0 | n/a | High | CVE-2023-26606 | 2/26/2023 |
| linux-headers | restricted.1.2.0 | n/a | High | CVE-2023-26605 | 2/26/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-26545 | 2/25/2023 |
| linux-headers | restricted.1.2.0 | n/a | High | CVE-2023-26544 | 2/25/2023 |
| linux-headers | restricted.1.2.0 | n/a | High | CVE-2023-26242 | 2/21/2023 |
| linux-headers | restricted.1.2.0 | n/a | High | CVE-2023-2598 | 6/1/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-2513 | 5/8/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-25012 | 2/1/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-2430 | 7/23/2023 |
| linux-headers | restricted.1.2.0 | Linux | Medium | CVE-2023-23586 - Use after free in io_uring in the Linux Kernel | 2/17/2023 |
| linux-headers | restricted.1.2.0 | n/a | High | CVE-2023-23559 | 1/13/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23455 | 1/12/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23454 | 1/12/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23039 | 2/22/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23006 | 3/1/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23005 | 3/1/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23004 | 3/1/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23003 | 3/1/2023 |
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2023-23002 | 3/1/2023 |