Search for packages
| purl | pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-5xtu-e6dr-97hb
Aliases: CVE-2022-1966 |
kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) | There are no reported fixed by versions. |
|
VCID-gkac-yybb-pqdv
Aliases: CVE-2022-32250 |
kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root | There are no reported fixed by versions. |
|
VCID-qfza-xn49-hyf1
Aliases: CVE-2022-1729 |
kernel: race condition in perf_event_open leads to privilege escalation | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:58:27.402360+00:00 | RedHat Importer | Affected by | VCID-qfza-xn49-hyf1 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1729.json | 38.0.0 |
| 2026-04-01T13:58:25.084633+00:00 | RedHat Importer | Affected by | VCID-gkac-yybb-pqdv | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32250.json | 38.0.0 |
| 2026-04-01T13:58:15.486213+00:00 | RedHat Importer | Affected by | VCID-5xtu-e6dr-97hb | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json | 38.0.0 |