Search for packages
| purl | pkg:rpm/redhat/kernel-rt@5.14.0-284.79.1.rt14.364?arch=el9_2 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1gaz-gg4z-9ye2
Aliases: CVE-2024-36971 |
kernel: net: kernel: UAF in network route management | There are no reported fixed by versions. |
|
VCID-2kmm-2mwh-yqb4
Aliases: CVE-2024-35907 |
kernel: mlxbf_gige: call request_irq() after NAPI initialized | There are no reported fixed by versions. |
|
VCID-3x7k-qvvd-q3be
Aliases: CVE-2023-52651 |
kernel: wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() | There are no reported fixed by versions. |
|
VCID-4qed-1xmj-9qhy
Aliases: CVE-2024-38556 |
kernel: net/mlx5: Add a timeout to acquire the command queue semaphore | There are no reported fixed by versions. |
|
VCID-7ufd-q9uj-wbhu
Aliases: CVE-2024-38627 |
kernel: stm class: Fix a double free in stm_register_device() | There are no reported fixed by versions. |
|
VCID-8hap-636e-23bt
Aliases: CVE-2024-35852 |
kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work | There are no reported fixed by versions. |
|
VCID-cmpm-gy15-tqch
Aliases: CVE-2024-38555 |
kernel: net/mlx5: Discard command completions in internal error | There are no reported fixed by versions. |
|
VCID-cz79-nh8x-b3hp
Aliases: CVE-2024-27046 |
kernel: nfp: flower: handle acti_netdevs allocation failure | There are no reported fixed by versions. |
|
VCID-dd8e-mqbz-zydu
Aliases: CVE-2024-27052 |
kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work | There are no reported fixed by versions. |
|
VCID-fgjg-b9mr-23h9
Aliases: CVE-2024-38586 |
kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. | There are no reported fixed by versions. |
|
VCID-h2r4-f7z1-pycq
Aliases: CVE-2024-26897 |
kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete | There are no reported fixed by versions. |
|
VCID-hk9z-ke75-dfec
Aliases: CVE-2024-36941 |
kernel: wifi: nl80211: don't free NULL coalescing rule | There are no reported fixed by versions. |
|
VCID-j6kj-8t9f-gkfj
Aliases: CVE-2023-52448 |
kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump | There are no reported fixed by versions. |
|
VCID-mcee-d48u-pqb7
Aliases: CVE-2024-35789 |
kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes | There are no reported fixed by versions. |
|
VCID-mtrw-kck6-jyb1
Aliases: CVE-2021-47383 |
kernel: tty: Fix out-of-bound vmalloc access in imageblit | There are no reported fixed by versions. |
|
VCID-mymw-65ux-j7h7
Aliases: CVE-2024-26855 |
kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() | There are no reported fixed by versions. |
|
VCID-tb3q-ndrt-mkg3
Aliases: CVE-2024-36922 |
kernel: wifi: iwlwifi: read txq->read_ptr under lock | There are no reported fixed by versions. |
|
VCID-vquw-k12t-syb4
Aliases: CVE-2024-35845 |
kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination | There are no reported fixed by versions. |
|
VCID-w99p-9ksx-kbef
Aliases: CVE-2023-52864 |
kernel: platform/x86: wmi: Fix opening of char device | There are no reported fixed by versions. |
|
VCID-wr7j-r4t5-1bgu
Aliases: CVE-2024-35937 |
kernel: wifi: cfg80211: check A-MSDU format more carefully | There are no reported fixed by versions. |
|
VCID-xxe5-3ae2-vygt
Aliases: CVE-2023-52771 |
kernel: cxl/port: Fix delete_endpoint() vs parent unregistration race | There are no reported fixed by versions. |
|
VCID-yuyy-u84g-1ufb
Aliases: CVE-2024-38538 |
kernel: net: bridge: xmit: make sure we have at least eth header len bytes | There are no reported fixed by versions. |
|
VCID-z5cz-xkzn-fbb6
Aliases: CVE-2024-21823 |
kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||