Search for packages
| purl | pkg:rpm/redhat/kernel-rt@3.10.0-1160.102.1.rt56.1250?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-kz9r-zumw-5ydf
Aliases: CVE-2023-3609 |
kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails | There are no reported fixed by versions. |
|
VCID-uqu9-hbxy-kqeh
Aliases: CVE-2023-32233 |
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | There are no reported fixed by versions. |
|
VCID-zvkd-p15d-7bde
Aliases: CVE-2023-35001 |
kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:54:02.338180+00:00 | RedHat Importer | Affected by | VCID-uqu9-hbxy-kqeh | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32233.json | 38.0.0 |
| 2026-04-01T13:53:32.223716+00:00 | RedHat Importer | Affected by | VCID-zvkd-p15d-7bde | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35001.json | 38.0.0 |
| 2026-04-01T13:53:20.564147+00:00 | RedHat Importer | Affected by | VCID-kz9r-zumw-5ydf | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3609.json | 38.0.0 |