- kernel-3.10.0-1160.118.1.el7 (rhel7)
- 3.10.0-1160.146.1.el7
- 2026-02-10 14:00:38
- 2026-02-12 17:04:11
- K20260210_03
- CVE-2024-36971
- Description:
net: fix __dst_negative_advice() race
- CVE: https://access.redhat.com/security/cve/CVE-2024-36971
- Patch: rhel7/3.10.0-1160.123.1.el7/CVE-2024-36971-ELSCVE-27162-net-fix-__dst_negative_advice-race.patch
- From: 3.10.0-1160.123.1.el7
- CVE-2022-1011
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/CVE-2022-1011
- Patch: rhel7/3.10.0-1160.123.1.el7/CVE-2022-1011-ELSCVE-14458-fuse-fix-pipe-buffer-lifetime-for-direc.patch
- From: 3.10.0-1160.123.1.el7
- CVE-2022-1011
- Description:
fuse: fix pipe buffer lifetime for direct_io
- CVE: https://access.redhat.com/security/cve/CVE-2022-1011
- Patch: rhel7/3.10.0-1160.123.1.el7/CVE-2022-1011-ELSCVE-14458-fuse-fix-pipe-buffer-lifetime-for-direc-kpatch.patch
- From: 3.10.0-1160.123.1.el7
- CVE-2024-41071
- Description:
wifi: mac80211: Avoid address calculations via out of bounds array indexing
- CVE: https://access.redhat.com/security/cve/CVE-2024-41071
- Patch: rhel7/3.10.0-1160.125.1.el7/CVE-2024-41071-wifi-mac80211-Avoid-address-calculation.patch
- From: 3.10.0-1160.125.1.el7
- CVE-2024-2201
- Description:
x86/bhi: Add support for clearing branch history at syscall entry
- CVE: https://access.redhat.com/security/cve/CVE-2024-2201
- Patch: 3.10.0/CVE-2024-2201-native-bhi-el7.patch
- From: kernel-4.18.0-553.16.1.el8_10
- CVE-2024-53104
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://access.redhat.com/security/cve/CVE-2024-53104
- Patch: rhel7/3.10.0-1160.132.1.el7/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UNDEFINED.patch
- From: 3.10.0-1160.132.1.el7
- CVE-2023-52922
- Description:
can: bcm: Fix UAF in bcm_proc_show()
- CVE: https://access.redhat.com/security/cve/CVE-2023-52922
- Patch: rhel7/3.10.0-1160.133.1.el7/CVE-2023-52922-can-bcm-Fix-UAF-in-bcm_proc_show.patch
- From: 3.10.0-1160.133.1.el7
- CVE-2024-50302
- Description:
HID: core: zero-initialize the report buffer
- CVE: https://access.redhat.com/security/cve/CVE-2024-50302
- Patch: rhel7/3.10.0-1160.133.1.el7/CVE-2024-50302-HID-core-zero-initialize-the-report-buffer.patch
- From: 3.10.0-1160.133.1.el7
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
- CVE: https://access.redhat.com/security/cve/CVE-2024-53197
- Patch: rhel7/3.10.0-1160.133.1.el7/CVE-2024-53197-0001-ALSA-usb-audio-Fix-potential-out-of-bound-accesses-f.patch
- From: 3.10.0-1160.133.1.el7
- CVE-2024-53197
- Description:
ALSA: usb-audio: Fix a DMA to stack memory bug
- CVE: https://access.redhat.com/security/cve/CVE-2024-53197
- Patch: rhel7/3.10.0-1160.133.1.el7/CVE-2024-53197-0002-ALSA-usb-audio-Fix-a-DMA-to-stack-memory-bug.patch
- From: 3.10.0-1160.133.1.el7
- CVE-2024-53150
- Description:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
- CVE: https://access.redhat.com/security/cve/CVE-2024-53150
- Patch: rhel7/3.10.0-1160.133.1.el7/CVE-2024-53150-alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
- From: 3.10.0-1160.133.1.el7
- CVE-2024-53141
- Description:
netfilter: ipset: add missing range check in bitmap_ip_uadt
- CVE: https://access.redhat.com/security/cve/CVE-2024-53141
- Patch: rhel7/3.10.0-1160.119.1.el7.tuxcare.els15/CVE-2024-53141-netfilter-ipset-add-missing-range-check.patch
- From: 3.10.0-1160.119.1.el7.tuxcare.els15
- CVE-2025-22004
- Description:
net: atm: fix use after free in lec_send()
- CVE: https://access.redhat.com/security/cve/CVE-2025-22004
- Patch: rhel7/3.10.0-1160.136.1.el7/CVE-2025-22004-net-atm-fix-use-after-free-in-lec_send.patch
- From: kernel-3.10.0-1160.136.1.el7
- CVE-2022-50066
- Description:
net: atlantic: fix aq_vec index out of range error
- CVE: https://access.redhat.com/security/cve/CVE-2022-50066
- Patch: rhel7/3.10.0-1160.136.1.el7/CVE-2022-50066-net-atlantic-fix-aq_vec-index-out-of-range-error.patch
- From: kernel-3.10.0-1160.136.1.el7
- CVE-2025-21928
- Description:
HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
- CVE: https://access.redhat.com/security/cve/CVE-2025-21928
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-21928-hid-intel-ish-hid-Fix-use-after-free-issue-in-ishtp_hid_remove.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2024-57980
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://access.redhat.com/security/cve/CVE-2024-57980
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2024-57980-media-uvcvideo-Fix-double-free-in-error.patch
- From: 3.10.0-1160.137.1.el79
- CVE-2022-49788
- Description:
misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
- CVE: https://access.redhat.com/security/cve/cve-2022-49788
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2022-49788-misc-vmw_vmci-fix-an-infoleak-in-vmci_host_do_receive_datagram.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-23150
- Description:
ext4: fix off-by-one error in do_split
- CVE: https://access.redhat.com/security/cve/CVE-2025-23150
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-23150-ext4-fix-off-by-one-error-in-do-split.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2022-50022
- Description:
drivers:md:fix a potential use-after-free bug
- CVE: https://access.redhat.com/security/cve/CVE-2022-50022
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2022-50022-drivers-md-fix-a-potential-use-after-free-bug.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38177
- Description:
sch_hfsc: make hfsc_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38177
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38177-sch_hfsc-make-hfsc_qlen_notify-idempotent.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2022-50020
- Description:
ext4: avoid resizing to a partial cluster size
- CVE: https://access.redhat.com/security/cve/CVE-2022-50020
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2022-50020-ext4-avoid-resizing-to-a-partial-cluster-size.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
Change signature of qdisc_tree_reduce_backlog() to use ints
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-sch_api-Change-signature-of-qdisc_tree_reduce_backlo.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
net/sched: Always pass notifications when child class becomes empty
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-net-sched-Always-pass-notifications-when-child-class.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
sch_cbq: make cbq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-sch_cbq-make-cbq_qlen_notify-idempotent.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
sch_htb: make htb_deactivate() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-sch_htb-make-htb_deactivate-idempotent.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-codel-remove-sch-qqlen-check-before-qdisc_tree_reduce_backlog.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
sch_qfq: make qfq_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-sch_qfq-make-qfq_qlen_notify-idempotent.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
sch_drr: make drr_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-sch_drr-make-drr_qlen_notify-idempotent.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38350
- Description:
sch_htb: make htb_qlen_notify() idempotent
- CVE: https://access.redhat.com/security/cve/CVE-2025-38350
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38350-sch_htb-make-htb_qlen_notify-idempotent.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38000
- Description:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38000
- Patch: rhel7/3.10.0-1160.137.1.el7/CVE-2025-38000-sch_hfsc-Fix-qlen-accounting-bug-when-using-peek-in-hfsc-enqueue.patch
- From: 3.10.0-1160.137.1.el7
- CVE-2025-38079
- Description:
crypto: algif_hash - fix double free in hash_accept
- CVE: https://access.redhat.com/security/cve/CVE-2025-38079
- Patch: rhel7/3.10.0-1160.138.1.el7/CVE-2025-38079-crypto-algif_hash-fix-double-free-in-hash_accept.patch
- From: kernel-3.10.0-1160.138.1.el7
- CVE-2025-38332
- Description:
scsi: lpfc: Use memcpy() for BIOS version
- CVE: https://access.redhat.com/security/cve/CVE-2025-38332
- Patch: rhel7/kernel-3.10.0-1160.139.1.el7/CVE-2025-38332-scsi-lpfc-Use-memcpy-for-BIOS-version.patch
- From: 3.10.0-1160.139.1.el7
- CVE-2025-38352
- Description:
posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
- CVE: https://access.redhat.com/security/cve/CVE-2025-38352
- Patch: rhel7/kernel-3.10.0-1160.139.1.el7/CVE-2025-38352-posix-cpu-timers-fix-race-between-handle_posix_cpu_timers-and-posix_cpu_timer_del.patch
- From: 3.10.0-1160.139.1.el7
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Limit packet length to skb->len
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel7/3.10.0-1160.141.1.el7/CVE-2023-53125-net-usb-smsc75xx-Limit-packet-length-to-skb-len.patch
- From: kernel-3.10.0-1160.141.1.el7
- CVE-2023-53125
- Description:
net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull
- CVE: https://access.redhat.com/security/cve/CVE-2023-53125
- Patch: rhel7/3.10.0-1160.141.1.el7/CVE-2023-53125-net-usb-smsc75xx-Move-packet-length-check-to-prevent.patch
- From: kernel-3.10.0-1160.141.1.el7
- CVE-2025-38477
- Description:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
- CVE: https://access.redhat.com/security/cve/CVE-2025-38477
- Patch: rhel7/3.10.0-1160.141.1.el7/CVE-2025-38477-net-sched-sch_qfq-Fix-race-condition-on-qfq_aggregate.patch
- From: kernel-3.10.0-1160.141.1.el7
- CVE-2022-48701
- Description:
nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48701
- Patch: rhel7/3.10.0-1160.141.1.el7/CVE-2022-48701-ALSA-usb-audio-Fix-an-out-of-bounds-bug-in-__snd_usb.patch
- From: kernel-3.10.0-1160.141.1.el7
- CVE-2025-38200
- Description:
i40e: fix MMIO write access to an invalid page in i40e_clear_hw
- CVE: https://access.redhat.com/security/cve/CVE-2025-38200
- Patch: rhel7/3.10.0-1160.141.1.el7/CVE-2025-38200-i40e-fix-MMIO-write-access-to-an-invalid-page-in-i40e_clear_hw.patch
- From: kernel-3.10.0-1160.141.1.el7
- CVE-2022-50229
- Description:
ALSA: bcd2000: Fix a UAF bug on the error path of probing
- CVE: https://access.redhat.com/security/cve/CVE-2022-50229
- Patch: rhel7/3.10.0-1160.141.1.el7/CVE-2022-50229-ALSA-bcd2000-Fix-a-UAF-bug-on-the-error-path-of-probing.patch
- From: kernel-3.10.0-1160.141.1.el7
- CVE-2022-50211
- Description:
md-raid10: fix KASAN warning
- CVE: https://access.redhat.com/security/cve/CVE-2022-50211
- Patch: rhel7/3.10.0-1160.141.1.el7/CVE-2022-50211-md-raid10-fix-KASAN-warning.patch
- From: kernel-3.10.0-1160.141.1.el7
- CVE-2025-37797
- Description:
net_sched: hfsc: Fix a UAF vulnerability in class handling
- CVE: https://access.redhat.com/security/cve/CVE-2025-37797
- Patch: rhel7/3.10.0-1160.142.1.el7/CVE-2025-37797-net_sched-hfsc-Fix-a-UAF-vulnerability-in-class-handling.patch
- From: kernel-3.10.0-1160.142.1.el7
- CVE-2025-38556
- Description:
HID: core: Harden s32ton() against conversion to 0 bits
- CVE: https://access.redhat.com/security/cve/CVE-2025-38556
- Patch: rhel7/3.10.0-1160.142.1.el7/CVE-2025-38556-core-Harden-s32ton-against-conversion-to-0-bits.patch
- From: kernel-3.10.0-1160.142.1.el7
- CVE-2023-53373
- Description:
crypto: seqiv - Handle EBUSY correctly
- CVE: https://access.redhat.com/security/cve/CVE-2023-53373
- Patch: rhel7/3.10.0-1160.142.1.el7/CVE-2023-53373-crypto-seqiv-handle-ebusy-correctly.patch
- From: kernel-3.10.0-1160.142.1.el7
- CVE-2025-22026
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2025-22026.patch
- From:
- CVE-2025-39751
- Description:
This CVE has been rejected or withdrawn by its CVE Numbering Authority as per NVD website
- CVE:
- Patch: skipped/CVE-2025-39751.patch
- From:
- CVE-2022-48978
- Description:
HID: core: detect and skip invalid inputs to snto32()
- CVE: https://access.redhat.com/security/cve/CVE-2022-48978
- Patch: rhel7/3.10.0-1160.142.1.el7/CVE-2022-48978-HID-core-detect-and-skip-invalid-inputs-to-snto32.patch
- From: kernel-3.10.0-1160.142.1.el7
- CVE-2022-48978
- Description:
HID: core: fix shift-out-of-bounds in hid_report_raw_event
- CVE: https://access.redhat.com/security/cve/CVE-2022-48978
- Patch: rhel7/3.10.0-1160.142.1.el7/CVE-2022-48978-HID-core-fix-shift-out-of-bounds-in-hid_report_raw_event.patch
- From: kernel-3.10.0-1160.142.1.el7
- CVE-2022-3640
- Description:
Out of scope: not affected
- CVE:
- Patch: skipped/CVE-2022-3640.patch
- From:
- CVE-2023-53305 CVE-2022-50386
- Description:
Bluetooth: L2CAP: Fix use-after-free
- CVE: https://access.redhat.com/security/cve/CVE-2022-50386
- Patch: rhel7/3.10.0-1160.143.1.el7/CVE-2023-53305-bluetooth-l2cap-fix-use-after-free.patch
- From: kernel-3.10.0-1160.143.1.el7
- CVE-2022-50408
- Description:
wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()
- CVE: https://access.redhat.com/security/cve/CVE-2022-50408
- Patch: rhel7/3.10.0-1160.143.1.el7/CVE-2022-50408-wifi-brcmfmac-fix-use-after-free-bug-in-brcmf_netdev_start_xmit.patch
- From: kernel-3.10.0-1160.143.1.el7
- CVE-2025-38718
- Description:
sctp: linearize cloned gso packets in sctp_rcv
- CVE: https://access.redhat.com/security/cve/CVE-2025-38718
- Patch: rhel7/3.10.0-1160.143.1.el7/CVE-2025-38718-sctp-linearize-cloned-gso-packets-in-sctp_rcv.patch
- From: kernel-3.10.0-1160.143.1.el7
- CVE-2023-53365
- Description:
ip6mr: Fix skb_under_panic in ip6mr_cache_report()
- CVE: https://access.redhat.com/security/cve/CVE-2023-53365
- Patch: rhel7/3.10.0-1160.143.1.el7/CVE-2023-53365-ip6mr-Fix-skb_under_panic-in-ip6mr_cache_report.patch
- From: kernel-3.10.0-1160.143.1.el7
- CVE-2022-50341
- Description:
cifs: fix oops during encryption
- CVE: https://access.redhat.com/security/cve/CVE-2022-50341
- Patch: rhel7/3.10.0-1160.143.1.el7/CVE-2022-50341-cifs-fix-oops-during-encryption.patch
- From: kernel-3.10.0-1160.143.1.el7
- CVE-2022-50367
- Description:
fs: fix UAF/GPF bug in nilfs_mdt_destroy
- CVE: https://access.redhat.com/security/cve/CVE-2022-50367
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2022-50367-fs-fix-uaf-gpf-bug-in-nilfs_mdt_destroy.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2022-50410
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://access.redhat.com/security/cve/CVE-2022-50410
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2022-50410-nfsd-protect-against-send-buffer-overflow-in-nfsv2-read.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2022-50406
- Description:
Bug isn't present in RHEL7 kernel.
- CVE:
- Patch: skipped/CVE-2022-50406.patch
- From:
- CVE-2023-53322
- Description:
scsi: qla2xxx: Wait for io return on terminate rport
- CVE: https://access.redhat.com/security/cve/CVE-2023-53322
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2023-53322-scsi-qla2xxx-wait-for-io-return-on-terminate-rport.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2025-39955
- Description:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()
- CVE: https://access.redhat.com/security/cve/CVE-2025-39955
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2025-39955-tcp-clear-tcp_sk-sk-fastopen_rsk-in-tcp_disconnect.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2023-53178
- Description:
mm: fix zswap writeback race condition
- CVE: https://access.redhat.com/security/cve/CVE-2023-53178
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2023-53178-mm-fix-zswap-writeback-race-condition.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2025-38729
- Description:
ALSA: usb-audio: Validate UAC3 power domain descriptors, too
- CVE: https://access.redhat.com/security/cve/CVE-2025-38729
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2025-38729-alsa-usb-audio-validate-uac3-power-domain-descriptors-too.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2025-38729
- Description:
ALSA: usb-audio: Validate UAC3 power domain descriptors, too
- CVE: https://access.redhat.com/security/cve/CVE-2025-38729
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2025-38729-alsa-usb-audio-validate-uac3-power-domain-descriptors-too-kpatch.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2025-39757
- Description:
ALSA: usb-audio: Validate UAC3 cluster segment descriptors
- CVE: https://access.redhat.com/security/cve/CVE-2025-39757
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2025-39757-alsa-usb-audio-validate-uac3-cluster-segment-descriptors.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2023-53297
- Description:
Bluetooth: L2CAP: fix bad unlock balance in l2cap_disconnect_rsp
- CVE: https://access.redhat.com/security/cve/CVE-2023-53297
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2023-53297-bluetooth-l2cap-fix-bad-unlock-balance-in-l2cap_disconnect_rsp-21.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2022-50356
- Description:
net: sched: sfb: fix null pointer access issue when sfb_init() fails
- CVE: https://access.redhat.com/security/cve/CVE-2022-50356
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2022-50356-net-sched-sfb-fix-null-pointer-access-issue-when-sfb_init-fails.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2022-50403
- Description:
ext4: fix undefined behavior in bit shift for ext4_check_flag_values
- CVE: https://access.redhat.com/security/cve/CVE-2022-50403
- Patch: rhel7/3.10.0-1160.144.1.el7/CVE-2022-50403-ext4-fix-undefined-behavior-in-bit-shift-for-ext4_check_flag_values.patch
- From: kernel-3.10.0-1160.144.1.el7
- CVE-2025-37823
- Description:
net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
- CVE: https://access.redhat.com/security/cve/CVE-2025-37823
- Patch: rhel7/3.10.0-1160.145.1.el7/CVE-2025-37823-net_sched-hfsc-Fix-a-potential-UAF-in-hfsc_dequeue-too.patch
- From: 3.10.0-1160.145.1.el7
- CVE-2023-53705
- Description:
ipv6: Fix out-of-bounds access in ipv6_find_tlv()
- CVE: https://access.redhat.com/security/cve/CVE-2023-53705
- Patch: rhel7/3.10.0-1160.145.1.el7/CVE-2023-53705-ipv6-Fix-out-of-bounds-access-in-ipv6_find_tlv.patch
- From: 3.10.0-1160.145.1.el7
- CVE-2025-68285
- Description:
libceph: fix potential use-after-free in have_mon_and_osd_map()
- CVE: https://access.redhat.com/security/cve/CVE-2025-68285
- Patch: rhel7/3.10.0-1160.145.1.el7/CVE-2025-68285-libceph-fix-potential-use-after-free-in-have_mon_and_osd_map.patch
- From: 3.10.0-1160.145.1.el7
- CVE-2023-53675
- Description:
scsi: ses: Fix possible desc_ptr out-of-bounds accesses
- CVE: https://access.redhat.com/security/cve/CVE-2023-53675
- Patch: rhel7/3.10.0-1160.145.1.el7/CVE-2023-53675-scsi-ses-Fix-possible-desc_ptr-out-of-bounds-accesses.patch
- From: 3.10.0-1160.145.1.el7
- CVE-2025-39971
- Description:
i40e: fix idx validation in config queues msg
- CVE: https://access.redhat.com/security/cve/CVE-2025-39971
- Patch: rhel7/3.10.0-1160.146.1.el7/CVE-2025-39971-i40e-fix-idx-validation-in-config-queues-msg.patch
- From: 3.10.0-1160.146.1.el7
- CVE-2025-39898
- Description:
CVE rejected
- CVE:
- Patch: skipped/CVE-2025-39898.patch
- From:
- CVE-2025-40248
- Description:
vsock: Ignore signal/timeout on connect() if already established
- CVE: https://access.redhat.com/security/cve/CVE-2025-40248
- Patch: rhel7/3.10.0-1160.146.1.el7/CVE-2025-40248-vsock-ignore-signal-timeout-on-connect-if-already-established.patch
- From: 3.10.0-1160.146.1.el7
- N/A
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 3.10.0/proc-restrict-pagemap-access-1062.patch
- From: N/A