Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/kernel@5.14.0-427.88.1?arch=el9_4
purl pkg:rpm/redhat/kernel@5.14.0-427.88.1?arch=el9_4
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (10)
Vulnerability Summary Fixed by
VCID-4xs3-r2ma-6kaz
Aliases:
CVE-2025-38159
kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds There are no reported fixed by versions.
VCID-9d1v-c3ex-kfez
Aliases:
CVE-2025-38085
kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race There are no reported fixed by versions.
VCID-9w88-du3c-qyc4
Aliases:
CVE-2025-38332
kernel: scsi: lpfc: Use memcpy() for BIOS version There are no reported fixed by versions.
VCID-ew57-csay-bube
Aliases:
CVE-2025-38250
kernel: Bluetooth: hci_core: Fix use-after-free in vhci_flush() There are no reported fixed by versions.
VCID-f89z-k7xe-83e4
Aliases:
CVE-2025-22097
kernel: drm/vkms: Fix use after free and double free on init error There are no reported fixed by versions.
VCID-kje2-4fqw-57gh
Aliases:
CVE-2025-37914
kernel: net_sched: ets: Fix double list add in class with netem as child qdisc There are no reported fixed by versions.
VCID-ku6a-16yf-wke1
Aliases:
CVE-2024-42094
kernel: net/iucv: Avoid explicit cpumask var allocation on stack There are no reported fixed by versions.
VCID-ndg7-qfdw-v3dn
Aliases:
CVE-2025-38464
kernel: tipc: Fix use-after-free in tipc_conn_close() There are no reported fixed by versions.
VCID-u7xr-nq3c-kbge
Aliases:
CVE-2024-50102
kernel: x86: fix user address masking non-canonical speculation issue There are no reported fixed by versions.
VCID-w2fj-8dqr-gbcc
Aliases:
CVE-2025-38352
kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:46:04.110288+00:00 RedHat Importer Affected by VCID-ku6a-16yf-wke1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42094.json 38.0.0
2026-04-01T13:44:09.936703+00:00 RedHat Importer Affected by VCID-u7xr-nq3c-kbge https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50102.json 38.0.0
2026-04-01T13:40:46.397230+00:00 RedHat Importer Affected by VCID-f89z-k7xe-83e4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-22097.json 38.0.0
2026-04-01T13:40:03.349456+00:00 RedHat Importer Affected by VCID-kje2-4fqw-57gh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37914.json 38.0.0
2026-04-01T13:38:56.700655+00:00 RedHat Importer Affected by VCID-9d1v-c3ex-kfez https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38085.json 38.0.0
2026-04-01T13:38:54.009232+00:00 RedHat Importer Affected by VCID-4xs3-r2ma-6kaz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38159.json 38.0.0
2026-04-01T13:38:42.092137+00:00 RedHat Importer Affected by VCID-ew57-csay-bube https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38250.json 38.0.0
2026-04-01T13:38:40.402313+00:00 RedHat Importer Affected by VCID-9w88-du3c-qyc4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38332.json 38.0.0
2026-04-01T13:38:19.713583+00:00 RedHat Importer Affected by VCID-w2fj-8dqr-gbcc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38352.json 38.0.0
2026-04-01T13:38:09.923534+00:00 RedHat Importer Affected by VCID-ndg7-qfdw-v3dn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38464.json 38.0.0