Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-427.26.1?arch=el9_4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.9 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3a5k-rqu5-k3dz
Aliases: CVE-2022-48627 |
kernel: vt: fix memory overlapping when deleting chars in the buffer | There are no reported fixed by versions. |
|
VCID-3bdu-hpbb-4ycp
Aliases: CVE-2024-38543 |
kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure | There are no reported fixed by versions. |
|
VCID-8nsp-v995-vbbz
Aliases: CVE-2024-35958 |
kernel: net: ena: Fix incorrect descriptor free behavior | There are no reported fixed by versions. |
|
VCID-b746-drvq-37hn
Aliases: CVE-2024-36886 |
kernel: TIPC message reassembly use-after-free remote code execution vulnerability | There are no reported fixed by versions. |
|
VCID-dfke-m8r4-93aq
Aliases: CVE-2024-27435 |
kernel: nvme: fix reconnection fail due to reserved tag allocation | There are no reported fixed by versions. |
|
VCID-e635-1mt5-nuhu
Aliases: CVE-2024-26783 |
kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index | There are no reported fixed by versions. |
|
VCID-fgjg-b9mr-23h9
Aliases: CVE-2024-38586 |
kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. | There are no reported fixed by versions. |
|
VCID-jz1t-cata-yug6
Aliases: CVE-2024-26858 |
kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map | There are no reported fixed by versions. |
|
VCID-kt6z-8b61-7yea
Aliases: CVE-2021-47548 |
kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() | There are no reported fixed by versions. |
|
VCID-mbpp-vv7v-ekht
Aliases: CVE-2023-52638 |
kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock | There are no reported fixed by versions. |
|
VCID-p9n9-wja3-tbcy
Aliases: CVE-2024-36904 |
kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). | There are no reported fixed by versions. |
|
VCID-smrn-64by-hyd2
Aliases: CVE-2021-47596 |
kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg | There are no reported fixed by versions. |
|
VCID-u59n-5bvw-kker
Aliases: CVE-2024-36270 |
kernel: netfilter: tproxy: bail out if IP has been disabled on the device | There are no reported fixed by versions. |
|
VCID-urnh-q2jd-27dj
Aliases: CVE-2024-27397 |
kernel: netfilter: nf_tables: use timestamp to check for set element timeout | There are no reported fixed by versions. |
|
VCID-vus3-xrdc-qkep
Aliases: CVE-2024-38593 |
kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 | There are no reported fixed by versions. |
|
VCID-z4ry-5wgu-akgj
Aliases: CVE-2024-38663 |
kernel: blk-cgroup: fix list corruption from resetting io stat | There are no reported fixed by versions. |
|
VCID-zx1z-mhtk-x7cn
Aliases: CVE-2024-36957 |
kernel: octeontx2-af: avoid off-by-one read from userspace | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||