Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-570.86.1?arch=el9_6 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4pfh-69kg-17bc
Aliases: CVE-2025-38051 |
kernel: smb: client: Fix use-after-free in cifs_fill_dirent | There are no reported fixed by versions. |
|
VCID-6wu1-5wuf-nyan
Aliases: CVE-2025-40322 |
kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling | There are no reported fixed by versions. |
|
VCID-bmu4-tvzy-e7hx
Aliases: CVE-2025-21786 |
kernel: workqueue: Put the pwq after detaching the rescuer from the pool | There are no reported fixed by versions. |
|
VCID-d2zp-q8zz-u3b2
Aliases: CVE-2025-21647 |
kernel: sched: sch_cake: add bounds checks to host bulk flow fairness counts | There are no reported fixed by versions. |
|
VCID-dgj8-npay-zke1
Aliases: CVE-2024-54456 |
kernel: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() | There are no reported fixed by versions. |
|
VCID-k4gr-apup-1bbw
Aliases: CVE-2025-38568 |
kernel: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing | There are no reported fixed by versions. |
|
VCID-qb49-dkqp-gbgw
Aliases: CVE-2025-68349 |
kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid | There are no reported fixed by versions. |
|
VCID-s1s6-ekvg-yuer
Aliases: CVE-2025-21791 |
kernel: vrf: use RCU protection in l3mdev_l3_out() | There are no reported fixed by versions. |
|
VCID-x7ch-ec75-7faz
Aliases: CVE-2025-38022 |
kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem | There are no reported fixed by versions. |
|
VCID-yx2t-ur4u-mkgj
Aliases: CVE-2025-40294 |
kernel: Linux kernel: Out-of-bounds write in Bluetooth MGMT can lead to information disclosure and denial of service | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||