Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-427.70.1?arch=el9_4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-57ww-5dxf-y7e2
Aliases: CVE-2025-21756 |
kernel: vsock: Keep the binding until socket destruction | There are no reported fixed by versions. |
|
VCID-9pn2-uujx-bkha
Aliases: CVE-2024-26901 |
kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak | There are no reported fixed by versions. |
|
VCID-a97s-ex9t-rkc3
Aliases: CVE-2024-57876 |
kernel: drm/dp_mst: Fix resetting msg rx state after topology removal | There are no reported fixed by versions. |
|
VCID-amh5-cxe3-z7eq
Aliases: CVE-2021-47495 |
kernel: usbnet: sanity check for maxpacket | There are no reported fixed by versions. |
|
VCID-b8p7-ctx4-afdf
Aliases: CVE-2023-52703 |
kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path | There are no reported fixed by versions. |
|
VCID-fz9m-axm1-4kcb
Aliases: CVE-2024-35946 |
kernel: wifi: rtw89: fix null pointer access when abort scan | There are no reported fixed by versions. |
|
VCID-jkdy-8t72-23g6
Aliases: CVE-2024-26907 |
kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment | There are no reported fixed by versions. |
|
VCID-qvdm-arkx-p3fd
Aliases: CVE-2023-52622 |
kernel: ext4: avoid online resizing failures due to oversized flex bg | There are no reported fixed by versions. |
|
VCID-smhw-w2rj-x7fn
Aliases: CVE-2023-52840 |
kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() | There are no reported fixed by versions. |
|
VCID-t38a-a7y9-1yge
Aliases: CVE-2025-37749 |
kernel: net: ppp: Add bound checking for skb data on ppp_sync_txmung | There are no reported fixed by versions. |
|
VCID-uhzc-svve-4qb1
Aliases: CVE-2024-26973 |
kernel: fat: fix uninitialized field in nostale filehandles | There are no reported fixed by versions. |
|
VCID-z3cd-cps8-5khf
Aliases: CVE-2024-27013 |
kernel: tun: limit printing rate when illegal packet received by tun dev | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||