kernel-rt-kvm vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-rt-kvm package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-53197

<0:5.14.0-503.31.1.el9_5
  • H
NULL Pointer Dereference

<0:5.14.0-503.31.1.el9_5
  • H
Use of Uninitialized Resource

<0:5.14.0-503.31.1.el9_5
  • H
Use After Free

<0:5.14.0-503.31.1.el9_5
  • H
CVE-2023-52922

<0:5.14.0-503.31.1.el9_5
  • H
CVE-2023-52605

<0:5.14.0-503.31.1.el9_5
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
CVE-2023-21102

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
CVE-2023-20593

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Information Exposure

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Race Condition

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Incorrect Authorization

<0:5.14.0-284.18.1.rt14.303.el9_2
  • H
Use After Free

<0:5.14.0-284.18.1.rt14.303.el9_2
  • M
CVE-2022-39190

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Exposure of Resource to Wrong Sphere

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Exposure of Resource to Wrong Sphere

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-23816

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-1353

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incomplete Cleanup

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-36946

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-29581

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Double Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Incorrect Conversion between Numeric Types

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-26373

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Improper Handling of Exceptional Conditions

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Out-of-bounds Write

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
CVE-2022-20368

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Race Condition

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Missing Initialization of Resource

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Memory Leak

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
NULL Pointer Dereference

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Race Condition

<0:5.14.0-162.6.1.rt21.168.el9_1
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Buffer Overflow

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Race Condition

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
CVE-2022-33743

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
CVE-2022-21505

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-70.30.1.rt21.102.el9_0
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Use After Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Locking

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
CVE-2022-39189

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Double Free

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Buffer Overflow

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-Bounds

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Memory Leak

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Resource Shutdown or Release

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Missing Authorization

<0:5.14.0-70.30.1.rt21.102.el9_0
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Restriction of Communication Channel to Intended Endpoints

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Insecure Default Initialization of Resource

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.11.1.rt14.296.el9_2
  • M
Use After Free

<0:5.14.0-162.6.1.rt21.168.el9_1
  • H
Race Condition

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-284.11.1.rt14.296.el9_2
  • H
Double Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.14.0-162.12.1.rt21.175.el9_1
  • M
Use After Free

<0:5.14.0-70.22.1.rt21.94.el9_0
  • M
Use of Uninitialized Resource

<0:5.14.0-70.22.1.rt21.94.el9_0
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:5.14.0-70.26.1.rt21.98.el9_0
  • H
Stack-based Buffer Overflow

<0:5.14.0-70.26.1.rt21.98.el9_0
  • H
Improper Ownership Management

<0:5.14.0-162.23.1.rt21.186.el9_1
  • H
Use After Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Deadlock

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Memory Leak

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Out-of-Bounds

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Integer Overflow or Wraparound

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Use After Free

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Out-of-bounds Write

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Race Condition

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Incorrect Calculation of Buffer Size

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Out-of-bounds Write

<0:5.14.0-70.17.1.rt21.89.el9_0
  • H
Use After Free

<0:5.14.0-70.17.1.rt21.89.el9_0
  • H
Race Condition

<0:5.14.0-70.17.1.rt21.89.el9_0
  • H
Memory Leak

<0:5.14.0-70.17.1.rt21.89.el9_0