| Version | |
|---|---|
| restricted.2.0.0 (latest) | |
| restricted.1.2.0 | |
| restricted.1.1 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | restricted.1.2.0 | n/a | Medium | CVE-2022-28356 | 4/2/2022 |
| linux-headers | restricted.2.0.0 | n/a | Medium | CVE-2022-28356 | 4/2/2022 |
| linux-headers | restricted.1.2.0 | n/a | Unknown | CVE-2022-27950 | 3/28/2022 |
| linux-headers | restricted.2.0.0 | n/a | Unknown | CVE-2022-27950 | 3/28/2022 |
| linux-headers | restricted.2.0.0 | Linux Kernel | Medium | CVE-2022-2785 - Arbitrary Memory read in BPF Linux Kernel | 9/23/2022 |
| linux-headers | restricted.1.2.0 | Linux Kernel | Medium | CVE-2022-2785 - Arbitrary Memory read in BPF Linux Kernel | 9/23/2022 |
| linux-headers | restricted.1.2.0 | n/a | Unknown | CVE-2022-27666 | 3/23/2022 |
| linux-headers | restricted.2.0.0 | n/a | Unknown | CVE-2022-27666 | 3/23/2022 |
| linux-headers | restricted.2.0.0 | n/a | Unknown | CVE-2022-27223 | 3/15/2022 |
| linux-headers | restricted.1.2.0 | n/a | Unknown | CVE-2022-27223 | 3/15/2022 |
| linux-headers | restricted.2.0.0 | n/a | Unknown | CVE-2022-26966 | 3/12/2022 |
| linux-headers | restricted.1.2.0 | n/a | Unknown | CVE-2022-26966 | 3/12/2022 |
| linux-headers | restricted.2.0.0 | n/a | Unknown | CVE-2022-26878 | 3/11/2022 |
| linux-headers | restricted.1.2.0 | n/a | Unknown | CVE-2022-26878 | 3/11/2022 |
| linux-headers | restricted.1.2.0 | n/a | Unknown | CVE-2022-26490 | 3/6/2022 |
| linux-headers | restricted.2.0.0 | n/a | Unknown | CVE-2022-26490 | 3/6/2022 |
| linux-headers | restricted.1.2.0 | n/a | Unknown | CVE-2022-2639 | 9/1/2022 |
| linux-headers | restricted.2.0.0 | n/a | Unknown | CVE-2022-2639 | 9/1/2022 |
| linux-headers | restricted.1.2.0 | Linux | Unknown | CVE-2022-26365 | 7/5/2022 |
| linux-headers | restricted.2.0.0 | Linux | Unknown | CVE-2022-26365 | 7/5/2022 |