Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-70.149.1?arch=el9_0 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.3 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3bny-rs9y-3yag
Aliases: CVE-2025-38527 |
kernel: smb: client: fix use-after-free in cifs_oplock_break | There are no reported fixed by versions. |
|
VCID-59yz-znzm-ufcv
Aliases: CVE-2025-37823 |
kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too | There are no reported fixed by versions. |
|
VCID-9n5s-42gn-63f1
Aliases: CVE-2022-50087 |
kernel: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails | There are no reported fixed by versions. |
|
VCID-abga-1vvy-2bfw
Aliases: CVE-2025-38498 |
kernel: do_change_type(): refuse to operate on unmounted/not ours mounts | There are no reported fixed by versions. |
|
VCID-jj1y-6xej-qkck
Aliases: CVE-2025-38200 |
kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw | There are no reported fixed by versions. |
|
VCID-kje2-4fqw-57gh
Aliases: CVE-2025-37914 |
kernel: net_sched: ets: Fix double list add in class with netem as child qdisc | There are no reported fixed by versions. |
|
VCID-mpvz-us67-gkec
Aliases: CVE-2025-37810 |
kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||