Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/kernel-rt@5.14.0-284.55.1.rt14.340?arch=el9_2
purl pkg:rpm/redhat/kernel-rt@5.14.0-284.55.1.rt14.340?arch=el9_2
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (10)
Vulnerability Summary Fixed by
VCID-1p3k-f3ck-83bg
Aliases:
CVE-2023-4244
kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction There are no reported fixed by versions.
VCID-5yqp-43hw-cuhu
Aliases:
CVE-2022-38096
kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query There are no reported fixed by versions.
VCID-5zmf-5v9v-k3h1
Aliases:
CVE-2023-51042
kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c There are no reported fixed by versions.
VCID-cavt-1v84-uqgt
Aliases:
CVE-2023-6546
kernel: GSM multiplexing race condition leads to privilege escalation There are no reported fixed by versions.
VCID-g6yc-cmf7-kbhf
Aliases:
CVE-2023-51043
kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c There are no reported fixed by versions.
VCID-pp43-v99a-k3cz
Aliases:
CVE-2024-0193
kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation There are no reported fixed by versions.
VCID-qkq7-ws9x-43f7
Aliases:
CVE-2024-1086
kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function There are no reported fixed by versions.
VCID-raem-h5nr-g7cq
Aliases:
CVE-2024-1085
kernel: nf_tables: use-after-free vulnerability in the nft_setelem_catchall_deactivate() function There are no reported fixed by versions.
VCID-rbrm-7x37-3ugv
Aliases:
CVE-2023-6817
kernel: inactive elements in nft_pipapo_walk There are no reported fixed by versions.
VCID-wmdx-p5fr-yqe4
Aliases:
CVE-2023-6931
kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:57:11.464888+00:00 RedHat Importer Affected by VCID-5yqp-43hw-cuhu https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38096.json 38.0.0
2026-04-01T13:52:57.848876+00:00 RedHat Importer Affected by VCID-1p3k-f3ck-83bg https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4244.json 38.0.0
2026-04-01T13:51:02.925501+00:00 RedHat Importer Affected by VCID-wmdx-p5fr-yqe4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6931.json 38.0.0
2026-04-01T13:50:49.278151+00:00 RedHat Importer Affected by VCID-rbrm-7x37-3ugv https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6817.json 38.0.0
2026-04-01T13:50:31.326702+00:00 RedHat Importer Affected by VCID-cavt-1v84-uqgt https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json 38.0.0
2026-04-01T13:50:30.268313+00:00 RedHat Importer Affected by VCID-pp43-v99a-k3cz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0193.json 38.0.0
2026-04-01T13:50:12.033633+00:00 RedHat Importer Affected by VCID-g6yc-cmf7-kbhf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51043.json 38.0.0
2026-04-01T13:50:04.773164+00:00 RedHat Importer Affected by VCID-5zmf-5v9v-k3h1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-51042.json 38.0.0
2026-04-01T13:50:02.151672+00:00 RedHat Importer Affected by VCID-raem-h5nr-g7cq https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1085.json 38.0.0
2026-04-01T13:50:01.941602+00:00 RedHat Importer Affected by VCID-qkq7-ws9x-43f7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1086.json 38.0.0