Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-372.19.1?arch=el8_6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5c6z-1ebs-wfev
Aliases: CVE-2022-1012 |
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak | There are no reported fixed by versions. |
|
VCID-gkac-yybb-pqdv
Aliases: CVE-2022-32250 |
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | There are no reported fixed by versions. |
|
VCID-wxvj-5nzz-9ybq
Aliases: CVE-2022-49541 |
kernel: cifs: fix potential double free during failed mount | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:58:42.389412+00:00 | RedHat Importer | Affected by | VCID-5c6z-1ebs-wfev | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1012.json | 38.0.0 |
| 2026-04-01T13:58:25.234142+00:00 | RedHat Importer | Affected by | VCID-gkac-yybb-pqdv | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32250.json | 38.0.0 |
| 2026-04-01T13:42:29.209283+00:00 | RedHat Importer | Affected by | VCID-wxvj-5nzz-9ybq | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49541.json | 38.0.0 |