Search for packages
| purl | pkg:rpm/redhat/kernel@4.18.0-477.43.1?arch=el8_8 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1vns-urfn-93dn
Aliases: CVE-2023-28328 |
kernel: Denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c | There are no reported fixed by versions. |
|
VCID-41ut-8u7g-fbhm
Aliases: CVE-2023-5717 |
kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list | There are no reported fixed by versions. |
|
VCID-5m63-9wck-6ud6
Aliases: CVE-2023-35823 |
kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() | There are no reported fixed by versions. |
|
VCID-6ehx-j3nb-2ffn
Aliases: CVE-2023-26545 |
kernel: mpls: double free on sysctl allocation failure | There are no reported fixed by versions. |
|
VCID-6nm8-f9v9-bqe3
Aliases: CVE-2023-0458 |
kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c | There are no reported fixed by versions. |
|
VCID-6znz-cyqz-7qeh
Aliases: CVE-2023-35825 |
kernel: r592: race condition leading to use-after-free in r592_remove() | There are no reported fixed by versions. |
|
VCID-8d7p-7myd-1uac
Aliases: CVE-2023-53147 |
kernel: xfrm: add NULL check in xfrm_update_ae_params | There are no reported fixed by versions. |
|
VCID-ae5d-jmsc-9ba5
Aliases: CVE-2023-2163 |
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe | There are no reported fixed by versions. |
|
VCID-b7em-hmb3-4yhp
Aliases: CVE-2023-45871 |
kernel: IGB driver inadequate buffer size for frames larger than MTU | There are no reported fixed by versions. |
|
VCID-bdv6-qrn1-aqhv
Aliases: CVE-2023-3611 |
kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead | There are no reported fixed by versions. |
|
VCID-cghg-192k-u7df
Aliases: CVE-2022-49995 |
kernel: writeback: avoid use-after-free after removing device | There are no reported fixed by versions. |
|
VCID-ebxk-u1b1-zybq
Aliases: CVE-2023-1855 |
kernel: use-after-free bug in remove function xgene_hwmon_remove | There are no reported fixed by versions. |
|
VCID-ejyg-b2cr-73gc
Aliases: CVE-2023-53996 |
kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages | There are no reported fixed by versions. |
|
VCID-gpry-jhh3-byed
Aliases: CVE-2023-4622 |
kernel: use after free in unix_stream_sendpage | There are no reported fixed by versions. |
|
VCID-hq32-ndng-kqcw
Aliases: CVE-2023-53296 |
kernel: sctp: check send stream number after wait_for_sndbuf | There are no reported fixed by versions. |
|
VCID-mdea-2xac-53ck
Aliases: CVE-2023-1838 |
kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend() | There are no reported fixed by versions. |
|
VCID-mhcw-xhun-3fe7
Aliases: CVE-2023-3812 |
kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags | There are no reported fixed by versions. |
|
VCID-mxda-6yrb-ukgb
Aliases: CVE-2023-4623 |
kernel: net/sched: sch_hfsc UAF | There are no reported fixed by versions. |
|
VCID-netb-fxrv-zyft
Aliases: CVE-2023-3772 |
kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() | There are no reported fixed by versions. |
|
VCID-nuaz-vadj-uyg8
Aliases: CVE-2023-52974 |
kernel: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress | There are no reported fixed by versions. |
|
VCID-ppf4-65p3-f7gq
Aliases: CVE-2023-52975 |
kernel: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress | There are no reported fixed by versions. |
|
VCID-qx5q-yc33-huhs
Aliases: CVE-2023-23455 |
Kernel: denial of service in atm_tc_enqueue in net/sched/sch_atm.c due to type confusion | There are no reported fixed by versions. |
|
VCID-r51v-h1rb-qqdr
Aliases: CVE-2023-33203 |
kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() | There are no reported fixed by versions. |
|
VCID-renx-7s4p-puaa
Aliases: CVE-2023-3141 |
kernel: Use after free bug in r592_remove | There are no reported fixed by versions. |
|
VCID-ryhg-z4qf-kyd6
Aliases: CVE-2023-1079 |
kernel: hid: Use After Free in asus_remove() | There are no reported fixed by versions. |
|
VCID-s15g-xfaf-pqck
Aliases: CVE-2023-5178 |
kernel: use after free in nvmet_tcp_free_crypto in NVMe | There are no reported fixed by versions. |
|
VCID-s4uv-qjv6-n7b8
Aliases: CVE-2023-1075 |
kernel: net/tls: tls_is_tx_ready() checked list_entry | There are no reported fixed by versions. |
|
VCID-sv6b-1fxf-2ygx
Aliases: CVE-2023-52973 |
kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF | There are no reported fixed by versions. |
|
VCID-ta4g-cdfd-w7fv
Aliases: CVE-2023-53372 |
kernel: sctp: fix a potential overflow in sctp_ifwdtsn_skip | There are no reported fixed by versions. |
|
VCID-uc3a-36wc-n3bt
Aliases: CVE-2023-4132 |
kernel: smsusb: use-after-free caused by do_submit_urb() | There are no reported fixed by versions. |
|
VCID-uhue-acky-4ye7
Aliases: CVE-2023-1073 |
kernel: HID: check empty report_list in hid_validate_values() | There are no reported fixed by versions. |
|
VCID-uswu-w3g7-9ybk
Aliases: CVE-2023-35824 |
kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() | There are no reported fixed by versions. |
|
VCID-ww12-xnsy-gyfm
Aliases: CVE-2023-2162 |
kernel: UAF during login when accessing the shost ipaddress | There are no reported fixed by versions. |
|
VCID-zcxw-xq7k-tkhx
Aliases: CVE-2023-46813 |
kernel: SEV-ES local priv escalation | There are no reported fixed by versions. |
|
VCID-zph7-5zjb-quae
Aliases: CVE-2023-3567 |
kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race | There are no reported fixed by versions. |
|
VCID-zuk7-eezk-mufb
Aliases: CVE-2023-31436 |
kernel: out-of-bounds write in qfq_change_class function | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||