Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/kernel-rt@4.18.0-553.32.1.rt7.373?arch=el8_10
purl pkg:rpm/redhat/kernel-rt@4.18.0-553.32.1.rt7.373?arch=el8_10
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-23xy-za5d-zqf7
Aliases:
CVE-2024-50142
kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset There are no reported fixed by versions.
VCID-8qgv-5n2y-sfa7
Aliases:
CVE-2024-50256
kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() There are no reported fixed by versions.
VCID-8x5z-wwqe-k3dk
Aliases:
CVE-2024-50264
kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans There are no reported fixed by versions.
VCID-a6dd-75ne-5yaz
Aliases:
CVE-2024-50110
kernel: xfrm: fix one more kernel-infoleak in algo dumping There are no reported fixed by versions.
VCID-d9hm-npfq-e7c1
Aliases:
CVE-2024-50192
kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE There are no reported fixed by versions.
VCID-h4x3-q7ew-8qhk
Aliases:
CVE-2024-50082
kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race There are no reported fixed by versions.
VCID-qtb6-udqg-n3dr
Aliases:
CVE-2024-49949
kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO There are no reported fixed by versions.
VCID-tz3p-a6fh-3bg8
Aliases:
CVE-2024-50099
kernel: arm64: probes: Remove broken LDR (literal) uprobe support There are no reported fixed by versions.
VCID-xwc5-xbwd-z3g7
Aliases:
CVE-2024-46695
kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:45:13.415214+00:00 RedHat Importer Affected by VCID-xwc5-xbwd-z3g7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46695.json 38.0.0
2026-04-01T13:44:35.185007+00:00 RedHat Importer Affected by VCID-qtb6-udqg-n3dr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-49949.json 38.0.0
2026-04-01T13:44:23.833170+00:00 RedHat Importer Affected by VCID-h4x3-q7ew-8qhk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50082.json 38.0.0
2026-04-01T13:44:10.004696+00:00 RedHat Importer Affected by VCID-a6dd-75ne-5yaz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50110.json 38.0.0
2026-04-01T13:44:09.369736+00:00 RedHat Importer Affected by VCID-tz3p-a6fh-3bg8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50099.json 38.0.0
2026-04-01T13:44:08.163535+00:00 RedHat Importer Affected by VCID-23xy-za5d-zqf7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50142.json 38.0.0
2026-04-01T13:44:07.180590+00:00 RedHat Importer Affected by VCID-d9hm-npfq-e7c1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50192.json 38.0.0
2026-04-01T13:44:06.126199+00:00 RedHat Importer Affected by VCID-8qgv-5n2y-sfa7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50256.json 38.0.0
2026-04-01T13:43:57.204036+00:00 RedHat Importer Affected by VCID-8x5z-wwqe-k3dk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50264.json 38.0.0