Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/kernel@4.18.0-477.43.1?arch=el8_8
purl pkg:rpm/redhat/kernel@4.18.0-477.43.1?arch=el8_8
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (36)
Vulnerability Summary Fixed by
VCID-1vns-urfn-93dn
Aliases:
CVE-2023-28328
kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c There are no reported fixed by versions.
VCID-41ut-8u7g-fbhm
Aliases:
CVE-2023-5717
kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list There are no reported fixed by versions.
VCID-5m63-9wck-6ud6
Aliases:
CVE-2023-35823
kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() There are no reported fixed by versions.
VCID-6ehx-j3nb-2ffn
Aliases:
CVE-2023-26545
kernel: mpls: double free on sysctl allocation failure There are no reported fixed by versions.
VCID-6nm8-f9v9-bqe3
Aliases:
CVE-2023-0458
kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c There are no reported fixed by versions.
VCID-6znz-cyqz-7qeh
Aliases:
CVE-2023-35825
kernel: r592: race condition leading to use-after-free in r592_remove() There are no reported fixed by versions.
VCID-8d7p-7myd-1uac
Aliases:
CVE-2023-53147
kernel: xfrm: add NULL check in xfrm_update_ae_params There are no reported fixed by versions.
VCID-ae5d-jmsc-9ba5
Aliases:
CVE-2023-2163
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe There are no reported fixed by versions.
VCID-b7em-hmb3-4yhp
Aliases:
CVE-2023-45871
kernel: IGB driver inadequate buffer size for frames larger than MTU There are no reported fixed by versions.
VCID-bdv6-qrn1-aqhv
Aliases:
CVE-2023-3611
kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead There are no reported fixed by versions.
VCID-cghg-192k-u7df
Aliases:
CVE-2022-49995
kernel: writeback: avoid use-after-free after removing device There are no reported fixed by versions.
VCID-ebxk-u1b1-zybq
Aliases:
CVE-2023-1855
kernel: use-after-free bug in remove function xgene_hwmon_remove There are no reported fixed by versions.
VCID-ejyg-b2cr-73gc
Aliases:
CVE-2023-53996
kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages There are no reported fixed by versions.
VCID-gpry-jhh3-byed
Aliases:
CVE-2023-4622
kernel: use after free in unix_stream_sendpage There are no reported fixed by versions.
VCID-hq32-ndng-kqcw
Aliases:
CVE-2023-53296
kernel: sctp: check send stream number after wait_for_sndbuf There are no reported fixed by versions.
VCID-mdea-2xac-53ck
Aliases:
CVE-2023-1838
kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() There are no reported fixed by versions.
VCID-mhcw-xhun-3fe7
Aliases:
CVE-2023-3812
kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags There are no reported fixed by versions.
VCID-mxda-6yrb-ukgb
Aliases:
CVE-2023-4623
kernel: net/sched: sch_hfsc UAF There are no reported fixed by versions.
VCID-netb-fxrv-zyft
Aliases:
CVE-2023-3772
kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() There are no reported fixed by versions.
VCID-nuaz-vadj-uyg8
Aliases:
CVE-2023-52974
kernel: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress There are no reported fixed by versions.
VCID-ppf4-65p3-f7gq
Aliases:
CVE-2023-52975
kernel: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress There are no reported fixed by versions.
VCID-qx5q-yc33-huhs
Aliases:
CVE-2023-23455
Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion There are no reported fixed by versions.
VCID-r51v-h1rb-qqdr
Aliases:
CVE-2023-33203
kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() There are no reported fixed by versions.
VCID-renx-7s4p-puaa
Aliases:
CVE-2023-3141
kernel: Use after free bug in r592_remove There are no reported fixed by versions.
VCID-ryhg-z4qf-kyd6
Aliases:
CVE-2023-1079
kernel: hid: Use After Free in asus_remove() There are no reported fixed by versions.
VCID-s15g-xfaf-pqck
Aliases:
CVE-2023-5178
kernel: use after free in nvmet_tcp_free_crypto in NVMe There are no reported fixed by versions.
VCID-s4uv-qjv6-n7b8
Aliases:
CVE-2023-1075
kernel: net/tls: tls_is_tx_ready() checked list_entry There are no reported fixed by versions.
VCID-sv6b-1fxf-2ygx
Aliases:
CVE-2023-52973
kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF There are no reported fixed by versions.
VCID-ta4g-cdfd-w7fv
Aliases:
CVE-2023-53372
kernel: sctp: fix a potential overflow in sctp_ifwdtsn_skip There are no reported fixed by versions.
VCID-uc3a-36wc-n3bt
Aliases:
CVE-2023-4132
kernel: smsusb: use-after-free caused by do_submit_urb() There are no reported fixed by versions.
VCID-uhue-acky-4ye7
Aliases:
CVE-2023-1073
kernel: HID: check empty report_list in hid_validate_values() There are no reported fixed by versions.
VCID-uswu-w3g7-9ybk
Aliases:
CVE-2023-35824
kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() There are no reported fixed by versions.
VCID-ww12-xnsy-gyfm
Aliases:
CVE-2023-2162
kernel: UAF during login when accessing the shost ipaddress There are no reported fixed by versions.
VCID-zcxw-xq7k-tkhx
Aliases:
CVE-2023-46813
kernel: SEV-ES local priv escalation There are no reported fixed by versions.
VCID-zph7-5zjb-quae
Aliases:
CVE-2023-3567
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race There are no reported fixed by versions.
VCID-zuk7-eezk-mufb
Aliases:
CVE-2023-31436
kernel: out-of-bounds write in qfq_change_class function There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:39:30.765976+00:00 RedHat Importer Affected by VCID-ppf4-65p3-f7gq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52975.json 38.4.0
2026-04-02T17:23:17.050557+00:00 RedHat Importer Affected by VCID-ta4g-cdfd-w7fv https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53372.json 38.1.0
2026-04-01T13:58:29.776775+00:00 RedHat Importer Affected by VCID-mdea-2xac-53ck https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1838.json 38.0.0
2026-04-01T13:56:33.046325+00:00 RedHat Importer Affected by VCID-mhcw-xhun-3fe7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3812.json 38.0.0
2026-04-01T13:56:17.548641+00:00 RedHat Importer Affected by VCID-1vns-urfn-93dn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28328.json 38.0.0
2026-04-01T13:55:55.000962+00:00 RedHat Importer Affected by VCID-qx5q-yc33-huhs https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23455.json 38.0.0
2026-04-01T13:55:50.882185+00:00 RedHat Importer Affected by VCID-zph7-5zjb-quae https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3567.json 38.0.0
2026-04-01T13:55:50.483789+00:00 RedHat Importer Affected by VCID-uhue-acky-4ye7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1073.json 38.0.0
2026-04-01T13:55:43.148143+00:00 RedHat Importer Affected by VCID-ww12-xnsy-gyfm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2162.json 38.0.0
2026-04-01T13:55:39.988361+00:00 RedHat Importer Affected by VCID-6nm8-f9v9-bqe3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0458.json 38.0.0
2026-04-01T13:55:37.449823+00:00 RedHat Importer Affected by VCID-s4uv-qjv6-n7b8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1075.json 38.0.0
2026-04-01T13:55:32.059712+00:00 RedHat Importer Affected by VCID-uc3a-36wc-n3bt https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4132.json 38.0.0
2026-04-01T13:55:31.033071+00:00 RedHat Importer Affected by VCID-ryhg-z4qf-kyd6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1079.json 38.0.0
2026-04-01T13:55:21.662366+00:00 RedHat Importer Affected by VCID-6ehx-j3nb-2ffn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-26545.json 38.0.0
2026-04-01T13:55:08.818438+00:00 RedHat Importer Affected by VCID-renx-7s4p-puaa https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3141.json 38.0.0
2026-04-01T13:55:07.524257+00:00 RedHat Importer Affected by VCID-ebxk-u1b1-zybq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1855.json 38.0.0
2026-04-01T13:54:42.769964+00:00 RedHat Importer Affected by VCID-r51v-h1rb-qqdr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33203.json 38.0.0
2026-04-01T13:54:23.190032+00:00 RedHat Importer Affected by VCID-zuk7-eezk-mufb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31436.json 38.0.0
2026-04-01T13:54:09.834080+00:00 RedHat Importer Affected by VCID-ae5d-jmsc-9ba5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2163.json 38.0.0
2026-04-01T13:53:41.650354+00:00 RedHat Importer Affected by VCID-6znz-cyqz-7qeh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35825.json 38.0.0
2026-04-01T13:53:41.544089+00:00 RedHat Importer Affected by VCID-uswu-w3g7-9ybk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35824.json 38.0.0
2026-04-01T13:53:41.459999+00:00 RedHat Importer Affected by VCID-5m63-9wck-6ud6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35823.json 38.0.0
2026-04-01T13:53:19.527997+00:00 RedHat Importer Affected by VCID-bdv6-qrn1-aqhv https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3611.json 38.0.0
2026-04-01T13:53:19.218882+00:00 RedHat Importer Affected by VCID-netb-fxrv-zyft https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3772.json 38.0.0
2026-04-01T13:52:59.072221+00:00 RedHat Importer Affected by VCID-b7em-hmb3-4yhp https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45871.json 38.0.0
2026-04-01T13:52:45.057279+00:00 RedHat Importer Affected by VCID-gpry-jhh3-byed https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4622.json 38.0.0
2026-04-01T13:52:44.283504+00:00 RedHat Importer Affected by VCID-mxda-6yrb-ukgb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4623.json 38.0.0
2026-04-01T13:51:28.796445+00:00 RedHat Importer Affected by VCID-s15g-xfaf-pqck https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5178.json 38.0.0
2026-04-01T13:51:20.214110+00:00 RedHat Importer Affected by VCID-41ut-8u7g-fbhm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5717.json 38.0.0
2026-04-01T13:51:17.316571+00:00 RedHat Importer Affected by VCID-zcxw-xq7k-tkhx https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46813.json 38.0.0
2026-04-01T13:41:39.122317+00:00 RedHat Importer Affected by VCID-ppf4-65p3-f7gq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52975.json 38.0.0
2026-04-01T13:41:37.616520+00:00 RedHat Importer Affected by VCID-nuaz-vadj-uyg8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52974.json 38.0.0
2026-04-01T13:41:36.540250+00:00 RedHat Importer Affected by VCID-sv6b-1fxf-2ygx https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52973.json 38.0.0
2026-04-01T13:39:17.665344+00:00 RedHat Importer Affected by VCID-cghg-192k-u7df https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49995.json 38.0.0
2026-04-01T13:37:04.608331+00:00 RedHat Importer Affected by VCID-8d7p-7myd-1uac https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53147.json 38.0.0
2026-04-01T13:36:52.328304+00:00 RedHat Importer Affected by VCID-hq32-ndng-kqcw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53296.json 38.0.0
2026-04-01T13:36:34.247837+00:00 RedHat Importer Affected by VCID-ta4g-cdfd-w7fv https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53372.json 38.0.0
2026-04-01T13:33:15.854360+00:00 RedHat Importer Affected by VCID-ejyg-b2cr-73gc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53996.json 38.0.0