Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/kernel@5.14.0-427.26.1?arch=el9_4
purl pkg:rpm/redhat/kernel@5.14.0-427.26.1?arch=el9_4
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.9
Vulnerabilities affecting this package (17)
Vulnerability Summary Fixed by
VCID-3a5k-rqu5-k3dz
Aliases:
CVE-2022-48627
kernel: vt: fix memory overlapping when deleting chars in the buffer There are no reported fixed by versions.
VCID-3bdu-hpbb-4ycp
Aliases:
CVE-2024-38543
kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure There are no reported fixed by versions.
VCID-8nsp-v995-vbbz
Aliases:
CVE-2024-35958
kernel: net: ena: Fix incorrect descriptor free behavior There are no reported fixed by versions.
VCID-b746-drvq-37hn
Aliases:
CVE-2024-36886
kernel: TIPC message reassembly use-after-free remote code execution vulnerability There are no reported fixed by versions.
VCID-dfke-m8r4-93aq
Aliases:
CVE-2024-27435
kernel: nvme: fix reconnection fail due to reserved tag allocation There are no reported fixed by versions.
VCID-e635-1mt5-nuhu
Aliases:
CVE-2024-26783
kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index There are no reported fixed by versions.
VCID-fgjg-b9mr-23h9
Aliases:
CVE-2024-38586
kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. There are no reported fixed by versions.
VCID-jz1t-cata-yug6
Aliases:
CVE-2024-26858
kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map There are no reported fixed by versions.
VCID-kt6z-8b61-7yea
Aliases:
CVE-2021-47548
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() There are no reported fixed by versions.
VCID-mbpp-vv7v-ekht
Aliases:
CVE-2023-52638
kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock There are no reported fixed by versions.
VCID-p9n9-wja3-tbcy
Aliases:
CVE-2024-36904
kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). There are no reported fixed by versions.
VCID-smrn-64by-hyd2
Aliases:
CVE-2021-47596
kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg There are no reported fixed by versions.
VCID-u59n-5bvw-kker
Aliases:
CVE-2024-36270
kernel: netfilter: tproxy: bail out if IP has been disabled on the device There are no reported fixed by versions.
VCID-urnh-q2jd-27dj
Aliases:
CVE-2024-27397
kernel: netfilter: nf_tables: use timestamp to check for set element timeout There are no reported fixed by versions.
VCID-vus3-xrdc-qkep
Aliases:
CVE-2024-38593
kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 There are no reported fixed by versions.
VCID-z4ry-5wgu-akgj
Aliases:
CVE-2024-38663
kernel: blk-cgroup: fix list corruption from resetting io stat There are no reported fixed by versions.
VCID-zx1z-mhtk-x7cn
Aliases:
CVE-2024-36957
kernel: octeontx2-af: avoid off-by-one read from userspace There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:49:26.222624+00:00 RedHat Importer Affected by VCID-3a5k-rqu5-k3dz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48627.json 38.0.0
2026-04-01T13:48:38.908187+00:00 RedHat Importer Affected by VCID-mbpp-vv7v-ekht https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52638.json 38.0.0
2026-04-01T13:48:28.330143+00:00 RedHat Importer Affected by VCID-e635-1mt5-nuhu https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26783.json 38.0.0
2026-04-01T13:48:12.108400+00:00 RedHat Importer Affected by VCID-jz1t-cata-yug6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26858.json 38.0.0
2026-04-01T13:47:48.805444+00:00 RedHat Importer Affected by VCID-urnh-q2jd-27dj https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27397.json 38.0.0
2026-04-01T13:47:33.464895+00:00 RedHat Importer Affected by VCID-dfke-m8r4-93aq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27435.json 38.0.0
2026-04-01T13:47:25.789835+00:00 RedHat Importer Affected by VCID-8nsp-v995-vbbz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35958.json 38.0.0
2026-04-01T13:47:08.562348+00:00 RedHat Importer Affected by VCID-kt6z-8b61-7yea https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47548.json 38.0.0
2026-04-01T13:47:06.254980+00:00 RedHat Importer Affected by VCID-zx1z-mhtk-x7cn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36957.json 38.0.0
2026-04-01T13:47:05.452747+00:00 RedHat Importer Affected by VCID-p9n9-wja3-tbcy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36904.json 38.0.0
2026-04-01T13:46:58.743191+00:00 RedHat Importer Affected by VCID-b746-drvq-37hn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36886.json 38.0.0
2026-04-01T13:46:47.268667+00:00 RedHat Importer Affected by VCID-3bdu-hpbb-4ycp https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38543.json 38.0.0
2026-04-01T13:46:45.194918+00:00 RedHat Importer Affected by VCID-fgjg-b9mr-23h9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38586.json 38.0.0
2026-04-01T13:46:44.961648+00:00 RedHat Importer Affected by VCID-vus3-xrdc-qkep https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38593.json 38.0.0
2026-04-01T13:46:42.774571+00:00 RedHat Importer Affected by VCID-smrn-64by-hyd2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47596.json 38.0.0
2026-04-01T13:46:38.607683+00:00 RedHat Importer Affected by VCID-u59n-5bvw-kker https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36270.json 38.0.0
2026-04-01T13:46:38.200396+00:00 RedHat Importer Affected by VCID-z4ry-5wgu-akgj https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38663.json 38.0.0