Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-477.124.1?arch=el8_8 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-93ce-35w8-h7ef
Aliases: CVE-2023-53513 |
kernel: nbd: fix incomplete validation of ioctl arg | There are no reported fixed by versions. |
|
VCID-fnzb-ch6y-t7ev
Aliases: CVE-2022-50543 |
kernel: RDMA/rxe: Fix mr->map double free | There are no reported fixed by versions. |
|
VCID-jd5u-abdm-wych
Aliases: CVE-2023-53680 |
kernel: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL | There are no reported fixed by versions. |
|
VCID-jnha-bjtc-5ugp
Aliases: CVE-2025-39825 |
kernel: smb: client: fix race with concurrent opens in rename(2) | There are no reported fixed by versions. |
|
VCID-kqv9-ss23-efhp
Aliases: CVE-2025-68285 |
kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() | There are no reported fixed by versions. |
|
VCID-vbk3-2zss-xqbw
Aliases: CVE-2023-53675 |
kernel: scsi: ses: Fix possible desc_ptr out-of-bounds accesses | There are no reported fixed by versions. |
|
VCID-wy74-8292-87c8
Aliases: CVE-2025-38724 |
kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() | There are no reported fixed by versions. |
|
VCID-x8jd-vket-qkec
Aliases: CVE-2023-53705 |
kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv() | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||