Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/kernel@5.14.0-427.37.1?arch=el9_4
purl pkg:rpm/redhat/kernel@5.14.0-427.37.1?arch=el9_4
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.5
Vulnerabilities affecting this package (21)
Vulnerability Summary Fixed by
VCID-1fz1-3x2y-juab
Aliases:
CVE-2024-27022
kernel: fork: defer linking file vma until vma is fully initialized There are no reported fixed by versions.
VCID-41ur-7cwy-tyf1
Aliases:
CVE-2024-42225
kernel: wifi: mt76: replace skb_put with skb_put_zero There are no reported fixed by versions.
VCID-4vrw-kfvp-e3b9
Aliases:
CVE-2024-38573
kernel: cppc_cpufreq: Fix possible null pointer dereference There are no reported fixed by versions.
VCID-5qdm-uk8j-vqaf
Aliases:
CVE-2024-38601
kernel: ring-buffer: Fix a race between readers and resize checks There are no reported fixed by versions.
VCID-6t6u-3hau-kbg6
Aliases:
CVE-2024-42246
kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket There are no reported fixed by versions.
VCID-781p-ba9u-63e8
Aliases:
CVE-2024-26931
kernel: scsi: qla2xxx: Fix command flush on cable pull There are no reported fixed by versions.
VCID-7g5r-n98k-w7h4
Aliases:
CVE-2024-26930
kernel: scsi: qla2xxx: Fix double free of the ha->vp_map pointer There are no reported fixed by versions.
VCID-asru-czwx-kybc
Aliases:
CVE-2024-38615
kernel: cpufreq: exit() callback is optional There are no reported fixed by versions.
VCID-awu1-pbuf-zyhb
Aliases:
CVE-2024-26991
kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes There are no reported fixed by versions.
VCID-djgy-muty-mygk
Aliases:
CVE-2024-36899
kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify There are no reported fixed by versions.
VCID-ezwk-8s3n-5ygu
Aliases:
CVE-2023-52884
kernel: Input: cyapa - add missing input core locking to suspend/resume functions There are no reported fixed by versions.
VCID-jhw1-ctdz-rua1
Aliases:
CVE-2024-26929
kernel: scsi: qla2xxx: Fix double free of fcport There are no reported fixed by versions.
VCID-kxj4-h5xy-a7bp
Aliases:
CVE-2024-40984
kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." There are no reported fixed by versions.
VCID-nhbr-efwv-f7fm
Aliases:
CVE-2024-41071
kernel: wifi: mac80211: Avoid address calculations via out of bounds array indexing There are no reported fixed by versions.
VCID-pqps-j285-pucb
Aliases:
CVE-2024-38562
kernel: wifi: nl80211: Avoid address calculations via out of bounds array indexing There are no reported fixed by versions.
VCID-sc6z-cvjh-fbg3
Aliases:
CVE-2024-36016
kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() There are no reported fixed by versions.
VCID-ueaz-eysk-abhx
Aliases:
CVE-2023-52439
kernel: uio: Fix use-after-free in uio_open There are no reported fixed by versions.
VCID-ujay-r4dd-37fh
Aliases:
CVE-2024-26739
kernel: net/sched: act_mirred: don't override retval if we already lost the skb There are no reported fixed by versions.
VCID-vmts-4etq-hqh7
Aliases:
CVE-2024-38570
kernel: gfs2: Fix potential glock use-after-free on unmount There are no reported fixed by versions.
VCID-w4ks-e4ng-yyan
Aliases:
CVE-2024-35895
kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem There are no reported fixed by versions.
VCID-wkqf-ex7a-73ft
Aliases:
CVE-2024-26947
kernel: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:49:41.169574+00:00 RedHat Importer Affected by VCID-ueaz-eysk-abhx https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52439.json 38.0.0
2026-04-01T13:48:42.507096+00:00 RedHat Importer Affected by VCID-ujay-r4dd-37fh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26739.json 38.0.0
2026-04-01T13:47:58.941380+00:00 RedHat Importer Affected by VCID-awu1-pbuf-zyhb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26991.json 38.0.0
2026-04-01T13:47:57.332491+00:00 RedHat Importer Affected by VCID-1fz1-3x2y-juab https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27022.json 38.0.0
2026-04-01T13:47:57.272130+00:00 RedHat Importer Affected by VCID-jhw1-ctdz-rua1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26929.json 38.0.0
2026-04-01T13:47:57.190874+00:00 RedHat Importer Affected by VCID-7g5r-n98k-w7h4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26930.json 38.0.0
2026-04-01T13:47:57.123459+00:00 RedHat Importer Affected by VCID-781p-ba9u-63e8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26931.json 38.0.0
2026-04-01T13:47:55.651566+00:00 RedHat Importer Affected by VCID-wkqf-ex7a-73ft https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26947.json 38.0.0
2026-04-01T13:47:29.646232+00:00 RedHat Importer Affected by VCID-w4ks-e4ng-yyan https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35895.json 38.0.0
2026-04-01T13:47:07.065168+00:00 RedHat Importer Affected by VCID-sc6z-cvjh-fbg3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36016.json 38.0.0
2026-04-01T13:47:05.689479+00:00 RedHat Importer Affected by VCID-djgy-muty-mygk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36899.json 38.0.0
2026-04-01T13:46:46.373082+00:00 RedHat Importer Affected by VCID-pqps-j285-pucb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38562.json 38.0.0
2026-04-01T13:46:45.901279+00:00 RedHat Importer Affected by VCID-vmts-4etq-hqh7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38570.json 38.0.0
2026-04-01T13:46:45.732650+00:00 RedHat Importer Affected by VCID-4vrw-kfvp-e3b9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38573.json 38.0.0
2026-04-01T13:46:44.512832+00:00 RedHat Importer Affected by VCID-5qdm-uk8j-vqaf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38601.json 38.0.0
2026-04-01T13:46:44.013367+00:00 RedHat Importer Affected by VCID-asru-czwx-kybc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38615.json 38.0.0
2026-04-01T13:46:39.373105+00:00 RedHat Importer Affected by VCID-ezwk-8s3n-5ygu https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52884.json 38.0.0
2026-04-01T13:46:23.469579+00:00 RedHat Importer Affected by VCID-kxj4-h5xy-a7bp https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40984.json 38.0.0
2026-04-01T13:46:01.506063+00:00 RedHat Importer Affected by VCID-nhbr-efwv-f7fm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-41071.json 38.0.0
2026-04-01T13:45:57.894977+00:00 RedHat Importer Affected by VCID-41ur-7cwy-tyf1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42225.json 38.0.0
2026-04-01T13:45:47.011100+00:00 RedHat Importer Affected by VCID-6t6u-3hau-kbg6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42246.json 38.0.0