Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-570.35.1?arch=el9_6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1ash-bxgn-83dd
Aliases: CVE-2025-38380 |
kernel: i2c/designware: Fix an initialization issue | There are no reported fixed by versions. |
|
VCID-4xs3-r2ma-6kaz
Aliases: CVE-2025-38159 |
kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds | There are no reported fixed by versions. |
|
VCID-9d1v-c3ex-kfez
Aliases: CVE-2025-38085 |
kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race | There are no reported fixed by versions. |
|
VCID-ejhc-6yqt-gkgv
Aliases: CVE-2024-28956 XSA-469 |
x86: Indirect Target Selection | There are no reported fixed by versions. |
|
VCID-ew57-csay-bube
Aliases: CVE-2025-38250 |
kernel: Bluetooth: hci_core: Fix use-after-free in vhci_flush() | There are no reported fixed by versions. |
|
VCID-hbxq-b1am-cugz
Aliases: CVE-2025-38124 |
kernel: net: fix udp gso skb_segment after pull from frag_list | There are no reported fixed by versions. |
|
VCID-meq5-pftb-y3d1
Aliases: CVE-2025-21867 |
kernel: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() | There are no reported fixed by versions. |
|
VCID-new6-g4u4-tqbh
Aliases: CVE-2025-38471 |
kernel: tls: always refresh the queue when reading sock | There are no reported fixed by versions. |
|
VCID-upz7-dr6x-1qem
Aliases: CVE-2025-38084 |
kernel: mm/hugetlb: unshare page tables during VMA split, not before | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||