Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/kernel@5.14.0-611.30.1?arch=el9_7
purl pkg:rpm/redhat/kernel@5.14.0-611.30.1?arch=el9_7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.4
Vulnerabilities affecting this package (16)
Vulnerability Summary Fixed by
VCID-2a25-xxe2-4bf3
Aliases:
CVE-2025-40141
kernel: Bluetooth: ISO: Fix possible UAF on iso_conn_free There are no reported fixed by versions.
VCID-2euh-sffk-tqgh
Aliases:
CVE-2025-40269
kernel: Linux kernel ALSA USB audio driver: Buffer overflow leading to information disclosure and denial of service There are no reported fixed by versions.
VCID-4zj4-fp3e-bbd7
Aliases:
CVE-2025-38730
kernel: Linux kernel: Data corruption and system instability due to improper io_uring/net buffer handling There are no reported fixed by versions.
VCID-dwzr-3wdm-jbh6
Aliases:
CVE-2025-38024
kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution There are no reported fixed by versions.
VCID-g162-81ms-93g7
Aliases:
CVE-2025-40158
kernel: ipv6: use RCU in ip6_output() There are no reported fixed by versions.
VCID-gqr9-19jt-qfds
Aliases:
CVE-2025-40170
kernel: net: use dst_dev_rcu() in sk_setup_caps() There are no reported fixed by versions.
VCID-hqpz-xjuf-vfa8
Aliases:
CVE-2025-37789
kernel: Linux kernel (openvswitch): Denial of Service and limited data exposure via improper key length validation There are no reported fixed by versions.
VCID-je4j-ksj2-hqb3
Aliases:
CVE-2025-40271
kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. There are no reported fixed by versions.
VCID-mu97-p4wb-5qck
Aliases:
CVE-2025-38459
kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion There are no reported fixed by versions.
VCID-pvfh-earf-aqdj
Aliases:
CVE-2025-39760
kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing There are no reported fixed by versions.
VCID-qvnj-rkxf-ukas
Aliases:
CVE-2025-38415
kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation There are no reported fixed by versions.
VCID-st94-aaeh-87ey
Aliases:
CVE-2025-40318
kernel: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once There are no reported fixed by versions.
VCID-vdnv-8h83-7kfs
Aliases:
CVE-2025-40135
kernel: ipv6: use RCU in ip6_xmit() There are no reported fixed by versions.
VCID-x7ch-ec75-7faz
Aliases:
CVE-2025-38022
kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem There are no reported fixed by versions.
VCID-ymen-78sb-uuax
Aliases:
CVE-2025-38403
kernel: Kernel: Privilege escalation via uninitialized data in vmci transport packet There are no reported fixed by versions.
VCID-za93-zh73-g3f4
Aliases:
CVE-2025-37819
kernel: Linux kernel: irqchip/gic-v2m use-after-free vulnerability There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-24T12:27:02.499194+00:00 RedHat Importer Affected by VCID-dwzr-3wdm-jbh6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38024.json 38.4.0
2026-04-02T17:23:18.444446+00:00 RedHat Importer Affected by VCID-qvnj-rkxf-ukas https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38415.json 38.1.0
2026-04-01T13:40:28.692912+00:00 RedHat Importer Affected by VCID-hqpz-xjuf-vfa8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37789.json 38.0.0
2026-04-01T13:40:20.961290+00:00 RedHat Importer Affected by VCID-za93-zh73-g3f4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-37819.json 38.0.0
2026-04-01T13:39:09.164892+00:00 RedHat Importer Affected by VCID-dwzr-3wdm-jbh6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38024.json 38.0.0
2026-04-01T13:39:07.826497+00:00 RedHat Importer Affected by VCID-x7ch-ec75-7faz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38022.json 38.0.0
2026-04-01T13:38:09.097235+00:00 RedHat Importer Affected by VCID-mu97-p4wb-5qck https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38459.json 38.0.0
2026-04-01T13:38:07.821238+00:00 RedHat Importer Affected by VCID-ymen-78sb-uuax https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38403.json 38.0.0
2026-04-01T13:38:07.098036+00:00 RedHat Importer Affected by VCID-qvnj-rkxf-ukas https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38415.json 38.0.0
2026-04-01T13:37:31.700857+00:00 RedHat Importer Affected by VCID-4zj4-fp3e-bbd7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38730.json 38.0.0
2026-04-01T13:37:10.005572+00:00 RedHat Importer Affected by VCID-pvfh-earf-aqdj https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39760.json 38.0.0
2026-04-01T13:35:02.902903+00:00 RedHat Importer Affected by VCID-g162-81ms-93g7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40158.json 38.0.0
2026-04-01T13:35:02.796807+00:00 RedHat Importer Affected by VCID-2a25-xxe2-4bf3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40141.json 38.0.0
2026-04-01T13:35:02.636874+00:00 RedHat Importer Affected by VCID-vdnv-8h83-7kfs https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40135.json 38.0.0
2026-04-01T13:35:02.282030+00:00 RedHat Importer Affected by VCID-gqr9-19jt-qfds https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40170.json 38.0.0
2026-04-01T13:33:59.481004+00:00 RedHat Importer Affected by VCID-2euh-sffk-tqgh https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40269.json 38.0.0
2026-04-01T13:33:58.775115+00:00 RedHat Importer Affected by VCID-je4j-ksj2-hqb3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40271.json 38.0.0
2026-04-01T13:33:57.727292+00:00 RedHat Importer Affected by VCID-st94-aaeh-87ey https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40318.json 38.0.0