Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-372.93.1?arch=el8_6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2n9k-dqfk-gkb9
Aliases: CVE-2023-31084 |
kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible | There are no reported fixed by versions. |
|
VCID-4gq7-1egy-p7a4
Aliases: CVE-2022-38457 |
kernel: vmwgfx: use-after-free in vmw_cmd_res_check | There are no reported fixed by versions. |
|
VCID-4w5c-d8pd-uqeb
Aliases: CVE-2022-29581 |
kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c | There are no reported fixed by versions. |
|
VCID-58sv-d9e3-rfbf
Aliases: CVE-2021-33655 |
kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory | There are no reported fixed by versions. |
|
VCID-5yqp-43hw-cuhu
Aliases: CVE-2022-38096 |
kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query | There are no reported fixed by versions. |
|
VCID-5zmf-5v9v-k3h1
Aliases: CVE-2023-51042 |
kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c | There are no reported fixed by versions. |
|
VCID-7e2m-a86y-c3bd
Aliases: CVE-2022-3239 |
kernel: media: em28xx: initialize refcount before kref_get | There are no reported fixed by versions. |
|
VCID-86j6-rxsj-jucj
Aliases: CVE-2023-1074 |
kernel: sctp: fail if no bound addresses can be used for a given scope | There are no reported fixed by versions. |
|
VCID-8uzn-q3h8-8qfs
Aliases: CVE-2023-30456 |
kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 | There are no reported fixed by versions. |
|
VCID-bdpj-gk16-a3dz
Aliases: CVE-2022-20368 |
kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() | There are no reported fixed by versions. |
|
VCID-cavt-1v84-uqgt
Aliases: CVE-2023-6546 |
kernel: GSM multiplexing race condition leads to privilege escalation | There are no reported fixed by versions. |
|
VCID-gpdn-rup2-7fey
Aliases: CVE-2022-40133 |
kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context | There are no reported fixed by versions. |
|
VCID-k4hm-xb4b-cbaw
Aliases: CVE-2022-23960 |
hw: cpu: arm64: Spectre-BHB | There are no reported fixed by versions. |
|
VCID-kkm1-jzbg-97d3
Aliases: CVE-2022-36402 |
kernel: vmwgfx: integer overflow in vmwgfx_execbuf.c | There are no reported fixed by versions. |
|
VCID-m26e-r8mc-jbbq
Aliases: CVE-2022-2196 |
kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks | There are no reported fixed by versions. |
|
VCID-nck8-brgn-hkdx
Aliases: CVE-2022-3625 |
kernel: use-after-free after failed devlink reload in devlink_param_get | There are no reported fixed by versions. |
|
VCID-qkq7-ws9x-43f7
Aliases: CVE-2024-1086 |
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function | There are no reported fixed by versions. |
|
VCID-wmdx-p5fr-yqe4
Aliases: CVE-2023-6931 |
kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||