kernel-rt-modules-extra vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-rt-modules-extra package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Initialization

<0:5.14.0-427.42.1.el9_4
  • M
Memory Leak

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41014

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41013

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-41005

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40998

<0:5.14.0-427.42.1.el9_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:5.14.0-427.42.1.el9_4
  • M
Improper Locking

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40972

<0:5.14.0-427.42.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40931

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-40904

<0:5.14.0-427.42.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.42.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-36244

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26961

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26935

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26923

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26826

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-26640

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2024-2201

<0:5.14.0-427.42.1.el9_4
  • M
CVE-2021-47383

<0:5.14.0-427.42.1.el9_4
  • M
Improper Check for Unusual or Exceptional Conditions

<0:5.14.0-427.40.1.el9_4
  • M
Use of Uninitialized Resource

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39502

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-39483

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-38556

<0:5.14.0-427.40.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-36889

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-35989

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2024-27403

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-52658

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2023-28746

<0:5.14.0-427.40.1.el9_4
  • M
CVE-2021-47385

<0:5.14.0-427.40.1.el9_4
  • M
Integer Overflow or Wraparound

<0:5.14.0-427.35.1.el9_4
  • M
Divide By Zero

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-42096

<0:5.14.0-427.35.1.el9_4
  • M
Allocation of Resources Without Limits or Throttling

<0:5.14.0-427.35.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • M
Double Free

<0:5.14.0-427.35.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-41044

<0:5.14.0-427.35.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-40936

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-40927

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-38619

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-38559

<0:5.14.0-427.35.1.el9_4
  • M
Use After Free

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-36883

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-36019

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-36000

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-35875

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-35797

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-35791

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26946

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26886

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26720

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26630

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2024-26629

<0:5.14.0-427.35.1.el9_4
  • M
CVE-2023-52801

<0:5.14.0-427.35.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.35.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-40928

<0:5.14.0-427.31.1.el9_4
  • H
Out-of-bounds Read

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38575

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38558

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-38391

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-37356

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-37353

<0:5.14.0-427.31.1.el9_4
  • H
Use After Free

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36941

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36929

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36922

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36921

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36903

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36020

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36017

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-36005

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35969

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35937

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35911

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35899

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35852

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35848

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35845

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35823

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35800

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-35789

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-33621

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27434

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27417

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27065

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27052

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-27049

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26897

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26868

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26853

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26828

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-26808

<0:5.14.0-427.31.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2024-21823

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-52864

<0:5.14.0-427.31.1.el9_4
  • H
CVE-2023-52651

<0:5.14.0-427.31.1.el9_4
  • H
Divide By Zero

<0:5.14.0-427.31.1.el9_4
  • M
CVE-2024-38580

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-36952

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-36924

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-35907

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-35885

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-35857

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-27046

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-27030

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26982

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26880

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26852

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26773

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2024-26737

<0:5.14.0-427.28.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • M
NULL Pointer Dereference

<0:5.14.0-427.28.1.el9_4
  • M
Out-of-bounds Write

<0:5.14.0-427.28.1.el9_4
  • M
CVE-2021-47459

<0:5.14.0-427.28.1.el9_4
  • H
CVE-2024-38663

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-38593

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-38586

<0:5.14.0-427.26.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-36957

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-36904

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-36886

<0:5.14.0-427.26.1.el9_4
  • H
NULL Pointer Dereference

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-35958

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-27435

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-27397

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26858

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2024-26783

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2023-52638

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2022-48627

<0:5.14.0-427.26.1.el9_4
  • H
Use After Free

<0:5.14.0-427.26.1.el9_4
  • H
CVE-2021-47548

<0:5.14.0-427.26.1.el9_4
  • M
CVE-2024-35960

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-35870

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-27393

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-26974

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-26801

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2023-52667

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2023-52626

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2021-47400

<0:5.14.0-427.24.1.el9_4
  • M
CVE-2024-26993

<0:5.14.0-427.20.1.el9_4
  • M
CVE-2024-26735

<0:5.14.0-427.20.1.el9_4
  • M
CVE-2024-25743

<0:5.14.0-427.16.1.el9_4
  • M
CVE-2024-25742

<0:5.14.0-427.16.1.el9_4
  • M
Information Exposure

<0:5.14.0-427.16.1.el9_4
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Use After Free

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
CVE-2023-21102

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
CVE-2023-20593

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Improper Cross-boundary Removal of Sensitive Data

<0:5.14.0-284.30.1.rt14.315.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Out-of-bounds Write

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Information Exposure

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
NULL Pointer Dereference

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Race Condition

<0:5.14.0-284.25.1.rt14.310.el9_2
  • H
Use After Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Double Free

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Deadlock

<0:5.14.0-162.22.2.rt21.186.el9_1
  • H
Integer Overflow or Wraparound

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Use After Free

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Out-of-bounds Write

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Race Condition

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Incorrect Calculation of Buffer Size

<0:5.14.0-162.18.1.rt21.181.el9_1
  • H
Use After Free

<0:5.14.0-70.30.1.rt21.102.el9
  • H
Allocation of Resources Without Limits or Throttling

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Memory Leak

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Buffer Overflow

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Missing Authorization

<0:5.14.0-70.30.1.rt21.102.el9
  • H
Out-of-Bounds

<0:5.14.0-162.12.1.rt21.175.el9_1
  • H
Race Condition

<0:5.14.0-162.12.1.rt21.175.el9_1