Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-427.37.1?arch=el9_4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1fz1-3x2y-juab
Aliases: CVE-2024-27022 |
kernel: fork: defer linking file vma until vma is fully initialized | There are no reported fixed by versions. |
|
VCID-41ur-7cwy-tyf1
Aliases: CVE-2024-42225 |
kernel: wifi: mt76: replace skb_put with skb_put_zero | There are no reported fixed by versions. |
|
VCID-4vrw-kfvp-e3b9
Aliases: CVE-2024-38573 |
kernel: cppc_cpufreq: Fix possible null pointer dereference | There are no reported fixed by versions. |
|
VCID-5qdm-uk8j-vqaf
Aliases: CVE-2024-38601 |
kernel: ring-buffer: Fix a race between readers and resize checks | There are no reported fixed by versions. |
|
VCID-6t6u-3hau-kbg6
Aliases: CVE-2024-42246 |
kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket | There are no reported fixed by versions. |
|
VCID-781p-ba9u-63e8
Aliases: CVE-2024-26931 |
kernel: scsi: qla2xxx: Fix command flush on cable pull | There are no reported fixed by versions. |
|
VCID-7g5r-n98k-w7h4
Aliases: CVE-2024-26930 |
kernel: scsi: qla2xxx: Fix double free of the ha->vp_map pointer | There are no reported fixed by versions. |
|
VCID-asru-czwx-kybc
Aliases: CVE-2024-38615 |
kernel: cpufreq: exit() callback is optional | There are no reported fixed by versions. |
|
VCID-awu1-pbuf-zyhb
Aliases: CVE-2024-26991 |
kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes | There are no reported fixed by versions. |
|
VCID-djgy-muty-mygk
Aliases: CVE-2024-36899 |
kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify | There are no reported fixed by versions. |
|
VCID-ezwk-8s3n-5ygu
Aliases: CVE-2023-52884 |
kernel: Input: cyapa - add missing input core locking to suspend/resume functions | There are no reported fixed by versions. |
|
VCID-jhw1-ctdz-rua1
Aliases: CVE-2024-26929 |
kernel: scsi: qla2xxx: Fix double free of fcport | There are no reported fixed by versions. |
|
VCID-kxj4-h5xy-a7bp
Aliases: CVE-2024-40984 |
kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." | There are no reported fixed by versions. |
|
VCID-nhbr-efwv-f7fm
Aliases: CVE-2024-41071 |
kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing | There are no reported fixed by versions. |
|
VCID-pqps-j285-pucb
Aliases: CVE-2024-38562 |
kernel: wifi: nl80211: Avoid address calculations via out of bounds array indexing | There are no reported fixed by versions. |
|
VCID-sc6z-cvjh-fbg3
Aliases: CVE-2024-36016 |
kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() | There are no reported fixed by versions. |
|
VCID-ueaz-eysk-abhx
Aliases: CVE-2023-52439 |
kernel: uio: Fix use-after-free in uio_open | There are no reported fixed by versions. |
|
VCID-ujay-r4dd-37fh
Aliases: CVE-2024-26739 |
kernel: net/sched: act_mirred: don't override retval if we already lost the skb | There are no reported fixed by versions. |
|
VCID-vmts-4etq-hqh7
Aliases: CVE-2024-38570 |
kernel: gfs2: Fix potential glock use-after-free on unmount | There are no reported fixed by versions. |
|
VCID-w4ks-e4ng-yyan
Aliases: CVE-2024-35895 |
kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem | There are no reported fixed by versions. |
|
VCID-wkqf-ex7a-73ft
Aliases: CVE-2024-26947 |
kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||