Search for packages
| purl | pkg:rpm/redhat/kernel@3.10.0-1160.148.1?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-676c-3wrp-1ufr
Aliases: CVE-2023-53539 |
kernel: RDMA/rxe: Fix incomplete state save in rxe_requester | There are no reported fixed by versions. |
|
VCID-9kuz-7fag-4qhv
Aliases: CVE-2026-23231 |
kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() | There are no reported fixed by versions. |
|
VCID-dwzr-3wdm-jbh6
Aliases: CVE-2025-38024 |
kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution | There are no reported fixed by versions. |
|
VCID-fjrr-1q5f-qyh2
Aliases: CVE-2025-38180 |
kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem | There are no reported fixed by versions. |
|
VCID-sct2-rhk9-v7dj
Aliases: CVE-2025-71238 |
kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. | There are no reported fixed by versions. |
|
VCID-sxuq-3azc-fqa2
Aliases: CVE-2022-50053 |
kernel: iavf: Fix reset error handling | There are no reported fixed by versions. |
|
VCID-th3e-y2nm-u7eh
Aliases: CVE-2026-23193 |
kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() | There are no reported fixed by versions. |
|
VCID-ucsz-fq2e-9ygk
Aliases: CVE-2026-23216 |
kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() | There are no reported fixed by versions. |
|
VCID-vsyg-x46t-ayhz
Aliases: CVE-2026-23204 |
kernel: net/sched: cls_u32: use skb_header_pointer_careful() | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||