Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-372.149.1?arch=el8_6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-64nd-yud7-wqev
Aliases: CVE-2025-21764 |
kernel: ndisc: use RCU protection in ndisc_alloc_skb() | There are no reported fixed by versions. |
|
VCID-exh5-yp4u-eqcg
Aliases: CVE-2022-49328 |
kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer | There are no reported fixed by versions. |
|
VCID-ym18-6d9k-9few
Aliases: CVE-2022-49696 |
kernel: tipc: fix use-after-free Read in tipc_named_reinit | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:42:32.184809+00:00 | RedHat Importer | Affected by | VCID-exh5-yp4u-eqcg | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49328.json | 38.0.0 |
| 2026-04-01T13:42:21.874603+00:00 | RedHat Importer | Affected by | VCID-ym18-6d9k-9few | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49696.json | 38.0.0 |
| 2026-04-01T13:42:09.171981+00:00 | RedHat Importer | Affected by | VCID-64nd-yud7-wqev | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21764.json | 38.0.0 |