Search for packages
| purl | pkg:rpm/redhat/kernel@5.14.0-284.86.1?arch=el9_2 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-cjdt-rytz-r7dy
Aliases: CVE-2024-38558 |
kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 | There are no reported fixed by versions. |
|
VCID-dz4e-s494-rqb3
Aliases: CVE-2024-36979 |
kernel: net: bridge: mst: fix vlan use-after-free | There are no reported fixed by versions. |
|
VCID-u59n-5bvw-kker
Aliases: CVE-2024-36270 |
kernel: netfilter: tproxy: bail out if IP has been disabled on the device | There are no reported fixed by versions. |
|
VCID-wyzb-1z24-dygv
Aliases: CVE-2024-27415 |
kernel: netfilter: bridge: confirm multicast packets before passing them up the stack | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:47:32.993932+00:00 | RedHat Importer | Affected by | VCID-wyzb-1z24-dygv | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27415.json | 38.0.0 |
| 2026-04-01T13:46:46.609341+00:00 | RedHat Importer | Affected by | VCID-cjdt-rytz-r7dy | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38558.json | 38.0.0 |
| 2026-04-01T13:46:43.830137+00:00 | RedHat Importer | Affected by | VCID-dz4e-s494-rqb3 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36979.json | 38.0.0 |
| 2026-04-01T13:46:38.630054+00:00 | RedHat Importer | Affected by | VCID-u59n-5bvw-kker | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36270.json | 38.0.0 |