RHSA-2026:10756

Vulnerability from csaf_redhat - Published: 2026-04-27 10:34 - Updated: 2026-04-27 14:23
Summary
Red Hat Security Advisory: kernel-rt security update
Severity
Moderate
Notes
Topic: An update for kernel-rt is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution (CVE-2025-38024) * kernel: iavf: Fix reset error handling (CVE-2022-50053) * kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180) * kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539) * kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193) * kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204) * kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (CVE-2026-23216) * kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231) * kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. (CVE-2025-71238) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A deadlock condition exists in the linux kernel such that when calling iavf_close in iavf_reset_task error handling,doing so can lead to double call of napi_disable thereby leading to a denial of service due to the deadlock.

CWE-833 - Deadlock
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

An incorrect state restoration flaw was found in the Linux kernel's RDMA rxe (soft-RoCE) driver in the requester packet transmission logic. A local user with access to RDMA devices can trigger this issue when network layer packet drops occur during RDMA send operations, causing the work queue element state to be incompletely saved and restored. This results in data corruption in resent packets, leading to denial of service or potential data integrity issues.

Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756
Workaround To mitigate this issue, prevent the rdma_rxe module from being loaded. See https://access.redhat.com/solutions/41278 for instructions on blacklisting kernel modules.

A flaw was found in the Linux kernel's Remote Direct Memory Access (RDMA) subsystem, specifically within the `rxe` component. This use-after-free vulnerability occurs in the `rxe_create_cq` function. When the `rxe_cq_from_init` function fails, the subsequent call to `rxe_cleanup` attempts to free memory resources that have already been released, leading to memory corruption. A local attacker with high privileges could exploit this flaw to cause a denial of service or potentially achieve arbitrary code execution.

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756
Workaround To mitigate this issue, prevent the `rxe` kernel module from loading. This can be achieved by creating a blacklist rule. 1. Create a file `/etc/modprobe.d/blacklist-rxe.conf` with the following content: ``` blacklist rxe install rxe /bin/true ``` 2. Rebuild the initial ramdisk: ```bash dracut -f -v ``` 3. Reboot the system for the changes to take effect. Warning: Blacklisting the `rxe` module may impact functionality that relies on Soft RoCE.

A flaw was found in the Linux kernel's Asynchronous Transfer Mode (ATM) subsystem. An authenticated local attacker could exploit a Use-After-Free (UAF) vulnerability in the /proc/net/atm/lec handling. This flaw occurs due to improper dev_put() calls without prior dev_hold() calls, leading to an imbalance in reference counting. Successful exploitation could allow the attacker to achieve privilege escalation or cause a denial of service.

CWE-911 - Improper Update of Reference Count
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756

A flaw was found in the Linux kernel's `qla2xxx` block SCSI generic (bsg) interface. This vulnerability, a double free, occurs because certain vendor-specific handlers incorrectly call the `bsg_job_done` function on both successful and failed operation paths. A local user could exploit this to trigger memory corruption, leading to a kernel crash and a Denial of Service (DoS). There is also a theoretical risk of local privilege escalation due to the memory corruption.

CWE-672 - Operation on a Resource after Expiration or Release
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756
Workaround To mitigate this issue, prevent module qla2xxx from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock. Similar to the connection usage count logic, the waiter signaled by complete() (e.g., in the session release path) may wake up and free the iscsit_session structure immediately. This creates a race condition where the current thread may attempt to execute spin_unlock_bh() on a session structure that has already been deallocated, resulting in a KASAN slab-use-after-free. To resolve this, release the session_usage_lock before calling complete() to ensure all dereferences of the sess pointer are finished before the waiter is allowed to proceed with deallocation.

CWE-364 - Signal Handler Race Condition
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756
Workaround To mitigate this issue, prevent module iscsi_target_mod from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221

CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756

A use-after-free flaw was found in the Linux kernel's iSCSI target subsystem. In the iscsit_dec_conn_usage_count() function, complete() is called while still holding the conn->conn_usage_lock spinlock. The waiting thread (such as iscsit_close_connection()) may wake up immediately and free the iscsit_conn structure before the current thread executes spin_unlock_bh(), resulting in a use-after-free when attempting to release the lock on already-freed memory.

CWE-413 - Improper Resource Locking
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756
Workaround To mitigate this issue, prevent the iscsi_target_mod module from being loaded. See https://access.redhat.com/solutions/41278 for instructions on how to blacklist kernel modules.

A flaw was found in the Linux kernel. A local attacker with CAP_NET_ADMIN capabilities, or remote packet traffic, could exploit a use-after-free vulnerability in the nf_tables_addchain() function's error handling. Successful exploitation could lead to a kernel crash, resulting in a Denial of Service (DoS), or potentially privilege escalation.

CWE-416 - Use After Free
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:10756
Workaround In order to trigger the issue, it requires the ability to create user/net namespaces. On non-containerized deployments of Red Hat Enterprise Linux 8, it is recommended to disable user namespaces by setting user.max_user_namespaces to 0: # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf On containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.
References
https://access.redhat.com/errata/RHSA-2026:10756 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=2373354 external
https://bugzilla.redhat.com/show_bug.cgi?id=2373553 external
https://bugzilla.redhat.com/show_bug.cgi?id=2376376 external
https://bugzilla.redhat.com/show_bug.cgi?id=2401510 external
https://bugzilla.redhat.com/show_bug.cgi?id=2439887 external
https://bugzilla.redhat.com/show_bug.cgi?id=2439931 external
https://bugzilla.redhat.com/show_bug.cgi?id=2440630 external
https://bugzilla.redhat.com/show_bug.cgi?id=2444376 external
https://bugzilla.redhat.com/show_bug.cgi?id=2444398 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2022-50053 self
https://bugzilla.redhat.com/show_bug.cgi?id=2373553 external
https://www.cve.org/CVERecord?id=CVE-2022-50053 external
https://nvd.nist.gov/vuln/detail/CVE-2022-50053 external
https://lore.kernel.org/linux-cve-announce/202506… external
https://access.redhat.com/security/cve/CVE-2023-53539 self
https://bugzilla.redhat.com/show_bug.cgi?id=2401510 external
https://www.cve.org/CVERecord?id=CVE-2023-53539 external
https://nvd.nist.gov/vuln/detail/CVE-2023-53539 external
https://lore.kernel.org/linux-cve-announce/202510… external
https://access.redhat.com/security/cve/CVE-2025-38024 self
https://bugzilla.redhat.com/show_bug.cgi?id=2373354 external
https://www.cve.org/CVERecord?id=CVE-2025-38024 external
https://nvd.nist.gov/vuln/detail/CVE-2025-38024 external
https://lore.kernel.org/linux-cve-announce/202506… external
https://access.redhat.com/security/cve/CVE-2025-38180 self
https://bugzilla.redhat.com/show_bug.cgi?id=2376376 external
https://www.cve.org/CVERecord?id=CVE-2025-38180 external
https://nvd.nist.gov/vuln/detail/CVE-2025-38180 external
https://lore.kernel.org/linux-cve-announce/202507… external
https://access.redhat.com/security/cve/CVE-2025-71238 self
https://bugzilla.redhat.com/show_bug.cgi?id=2444398 external
https://www.cve.org/CVERecord?id=CVE-2025-71238 external
https://nvd.nist.gov/vuln/detail/CVE-2025-71238 external
https://lore.kernel.org/linux-cve-announce/202603… external
https://access.redhat.com/security/cve/CVE-2026-23193 self
https://bugzilla.redhat.com/show_bug.cgi?id=2439887 external
https://www.cve.org/CVERecord?id=CVE-2026-23193 external
https://nvd.nist.gov/vuln/detail/CVE-2026-23193 external
https://lore.kernel.org/linux-cve-announce/202602… external
https://access.redhat.com/security/cve/CVE-2026-23204 self
https://bugzilla.redhat.com/show_bug.cgi?id=2439931 external
https://www.cve.org/CVERecord?id=CVE-2026-23204 external
https://nvd.nist.gov/vuln/detail/CVE-2026-23204 external
https://lore.kernel.org/linux-cve-announce/202602… external
https://access.redhat.com/security/cve/CVE-2026-23216 self
https://bugzilla.redhat.com/show_bug.cgi?id=2440630 external
https://www.cve.org/CVERecord?id=CVE-2026-23216 external
https://nvd.nist.gov/vuln/detail/CVE-2026-23216 external
https://lore.kernel.org/linux-cve-announce/202602… external
https://access.redhat.com/security/cve/CVE-2026-23231 self
https://bugzilla.redhat.com/show_bug.cgi?id=2444376 external
https://www.cve.org/CVERecord?id=CVE-2026-23231 external
https://nvd.nist.gov/vuln/detail/CVE-2026-23231 external
https://lore.kernel.org/linux-cve-announce/202603… external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution (CVE-2025-38024)\n\n* kernel: iavf: Fix reset error handling (CVE-2022-50053)\n\n* kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180)\n\n* kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539)\n\n* kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193)\n\n* kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)\n\n* kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (CVE-2026-23216)\n\n* kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)\n\n* kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. (CVE-2025-71238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:10756",
        "url": "https://access.redhat.com/errata/RHSA-2026:10756"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2373354",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373354"
      },
      {
        "category": "external",
        "summary": "2373553",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373553"
      },
      {
        "category": "external",
        "summary": "2376376",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376376"
      },
      {
        "category": "external",
        "summary": "2401510",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401510"
      },
      {
        "category": "external",
        "summary": "2439887",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439887"
      },
      {
        "category": "external",
        "summary": "2439931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439931"
      },
      {
        "category": "external",
        "summary": "2440630",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440630"
      },
      {
        "category": "external",
        "summary": "2444376",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
      },
      {
        "category": "external",
        "summary": "2444398",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444398"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_10756.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security update",
    "tracking": {
      "current_release_date": "2026-04-27T14:23:55+00:00",
      "generator": {
        "date": "2026-04-27T14:23:55+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.5"
        }
      },
      "id": "RHSA-2026:10756",
      "initial_release_date": "2026-04-27T10:34:03+00:00",
      "revision_history": [
        {
          "date": "2026-04-27T10:34:03+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-27T10:34:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-04-27T14:23:55+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
                "product": {
                  "name": "Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
                  "product_id": "7Server-RT-ELS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras_rt_els:7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
                  "product_id": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.148.1.rt56.1300.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.148.1.rt56.1300.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
                  "product_id": "kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.148.1.rt56.1300.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch"
        },
        "product_reference": "kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7 ELS)",
          "product_id": "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
        "relates_to_product_reference": "7Server-RT-ELS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-50053",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "discovery_date": "2025-06-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2373553"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A deadlock condition exists in the linux kernel such that when calling iavf_close in iavf_reset_task error handling,doing so can\nlead to double call of napi_disable thereby leading to a denial of service due to the deadlock.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: iavf: Fix reset error handling",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-50053"
        },
        {
          "category": "external",
          "summary": "RHBZ#2373553",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373553"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50053",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-50053"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50053",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50053"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2022-50053-9359@gregkh/T"
        }
      ],
      "release_date": "2025-06-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: iavf: Fix reset error handling"
    },
    {
      "cve": "CVE-2023-53539",
      "discovery_date": "2025-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2401510"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An incorrect state restoration flaw was found in the Linux kernel\u0027s RDMA rxe (soft-RoCE) driver in the requester packet transmission logic. \nA local user with access to RDMA devices can trigger this issue when network layer packet drops occur during RDMA send operations, causing the work queue element state to be incompletely saved and restored. This results in data corruption in resent packets, leading to denial of service or potential data integrity issues.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: RDMA/rxe: Fix incomplete state save in rxe_requester",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The vulnerability occurs when rxe_requester attempts to retransmit a packet after receiving -EAGAIN from the IP layer. The code saves work queue element state to enable retransmission, but fails to preserve the DMA structure that tracks scatter-gather list processing. Additionally, the state snapshot happens after packet construction has already modified the DMA fields. When heavy network stress causes packet drops\u2014particularly when a fast sender communicates with a slow receiver across multiple queue pairs\u2014the incomplete restoration causes retransmitted packets to carry corrupted payload data.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-53539"
        },
        {
          "category": "external",
          "summary": "RHBZ#2401510",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401510"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-53539",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53539",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53539"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025100443-CVE-2023-53539-4411@gregkh/T"
        }
      ],
      "release_date": "2025-10-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the rdma_rxe module from being loaded. See https://access.redhat.com/solutions/41278 for instructions on blacklisting kernel modules.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: RDMA/rxe: Fix incomplete state save in rxe_requester"
    },
    {
      "cve": "CVE-2025-38024",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2025-06-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2373354"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s Remote Direct Memory Access (RDMA) subsystem, specifically within the `rxe` component. This use-after-free vulnerability occurs in the `rxe_create_cq` function. When the `rxe_cq_from_init` function fails, the subsequent call to `rxe_cleanup` attempts to free memory resources that have already been released, leading to memory corruption. A local attacker with high privileges could exploit this flaw to cause a denial of service or potentially achieve arbitrary code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Moderate: A use-after-free leading to a kernel information leak issue was seen in the Linux kernel\u0027s RDMA `rxe` component, which allows a local attacker with special group privilege to cause a denial of service. This flaw affects Red Hat Enterprise Linux 7, 8, and 9.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-38024"
        },
        {
          "category": "external",
          "summary": "RHBZ#2373354",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373354"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-38024",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-38024",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38024"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2025-38024-2904@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025061847-CVE-2025-38024-2904@gregkh/T"
        }
      ],
      "release_date": "2025-06-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the `rxe` kernel module from loading. This can be achieved by creating a blacklist rule.\n\n1. Create a file `/etc/modprobe.d/blacklist-rxe.conf` with the following content:\n```\nblacklist rxe\ninstall rxe /bin/true\n```\n2. Rebuild the initial ramdisk:\n```bash\ndracut -f -v\n```\n3. Reboot the system for the changes to take effect.\n\nWarning: Blacklisting the `rxe` module may impact functionality that relies on Soft RoCE.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution"
    },
    {
      "cve": "CVE-2025-38180",
      "cwe": {
        "id": "CWE-911",
        "name": "Improper Update of Reference Count"
      },
      "discovery_date": "2025-07-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2376376"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s Asynchronous Transfer Mode (ATM) subsystem. An authenticated local attacker could exploit a Use-After-Free (UAF) vulnerability in the /proc/net/atm/lec handling. This flaw occurs due to improper dev_put() calls without prior dev_hold() calls, leading to an imbalance in reference counting. Successful exploitation could allow the attacker to achieve privilege escalation or cause a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Moderate: A Use-After-Free vulnerability in the Linux kernel\u0027s Asynchronous Transfer Mode (ATM) subsystem allows an authenticated local attacker to cause a denial of service or a leak in kernel internal information. This flaw affects Red Hat Enterprise Linux 7, 8, and 9. Exploitation requires the ATM subsystem to be active, which is not enabled by default in typical Red Hat Enterprise Linux installations.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-38180"
        },
        {
          "category": "external",
          "summary": "RHBZ#2376376",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376376"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-38180",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-38180",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-38180"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025070410-CVE-2025-38180-c6d0@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025070410-CVE-2025-38180-c6d0@gregkh/T"
        }
      ],
      "release_date": "2025-07-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem"
    },
    {
      "cve": "CVE-2025-71238",
      "cwe": {
        "id": "CWE-672",
        "name": "Operation on a Resource after Expiration or Release"
      },
      "discovery_date": "2026-03-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2444398"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u0027s `qla2xxx` block SCSI generic (bsg) interface. This vulnerability, a double free, occurs because certain vendor-specific handlers incorrectly call the `bsg_job_done` function on both successful and failed operation paths. A local user could exploit this to trigger memory corruption, leading to a kernel crash and a Denial of Service (DoS). There is also a theoretical risk of local privilege escalation due to the memory corruption.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation.",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "A kernel double free can be triggered in the qla2xxx bsg interface because some vendor specific handlers called bsg_job_done on both success and failure paths. This can result in the same bsg job being completed and freed twice which leads to memory corruption and a kernel crash. The issue is not network reachable. Impact is denial of service and there is a theoretical risk of local privilege escalation because the flaw is a kernel memory corruption condition.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-71238"
        },
        {
          "category": "external",
          "summary": "RHBZ#2444398",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444398"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-71238",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-71238",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71238"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2026030437-CVE-2025-71238-76bc@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2026030437-CVE-2025-71238-76bc@gregkh/T"
        }
      ],
      "release_date": "2026-03-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module qla2xxx from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation."
    },
    {
      "cve": "CVE-2026-23193",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "discovery_date": "2026-02-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2439887"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess-\u003esession_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "A use after free can occur in the iSCSI target session usage count logic because iscsit_dec_session_usage_count can call complete while holding session_usage_lock. A waiting thread in the session release path can wake up and free the session structure immediately after the completion is signaled. The current thread may then attempt to unlock or otherwise access fields in a session object that has already been deallocated which can trigger a slab use after free and crash the kernel. The attack surface is adjacent network because iSCSI targets are typically reachable only inside storage or data center networks. Impact can be denial of service. A conservative assessment also considers potential confidentiality and integrity impact due to kernel memory corruption from a use after free.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-23193"
        },
        {
          "category": "external",
          "summary": "RHBZ#2439887",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439887"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-23193",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23193",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23193"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23193-2c6c@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23193-2c6c@gregkh/T"
        }
      ],
      "release_date": "2026-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent module iscsi_target_mod from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()"
    },
    {
      "cve": "CVE-2026-23204",
      "cwe": {
        "id": "CWE-1285",
        "name": "Improper Validation of Specified Index, Position, or Offset in Input"
      },
      "discovery_date": "2026-02-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2439931"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net/sched: cls_u32: use skb_header_pointer_careful()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "An out of bounds memory access vulnerability exists in the Linux traffic control u32 classifier implementation. In u32_classify the kernel calculates offsets such as toff using key off values masks and variable offsets and then dereferences packet data using skb_header_pointer. The helper skb_header_pointer does not fully validate negative offset values. With a crafted configuration and packet layout the computed offset can become negative or otherwise invalid in a way that bypasses the existing checks and results in an out of bounds access. The most direct impact is a kernel crash causing a denial of service. Because the access pattern involves reading packet data at attacker influenced offsets it may also allow information disclosure of adjacent kernel memory and in worst cases could contribute to privilege escalation chains. Exploitation prerequisites depend on whether the system has tc u32 filters configured on a traffic path. For the CVSS the base score uses PR:L because configuring tc filters typically requires elevated privileges but can be available in containers or network namespaces with CAP_NET_ADMIN.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "RHBZ#2439931",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439931"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-23204",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23204",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T"
        }
      ],
      "release_date": "2026-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net/sched: cls_u32: use skb_header_pointer_careful()"
    },
    {
      "cve": "CVE-2026-23216",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "discovery_date": "2026-02-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2440630"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s iSCSI target subsystem. In the iscsit_dec_conn_usage_count() function, complete() is called while still holding the conn-\u003econn_usage_lock spinlock. The waiting thread (such as iscsit_close_connection()) may wake up immediately and free the iscsit_conn structure before the current thread executes spin_unlock_bh(), resulting in a use-after-free when attempting to release the lock on already-freed memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability requires the iSCSI target subsystem to be configured and in use, which limits the attack surface to systems actively serving as iSCSI targets. The race condition is timing-dependent and requires specific connection teardown sequences to trigger. Successful exploitation could lead to kernel crash or potentially memory corruption.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-23216"
        },
        {
          "category": "external",
          "summary": "RHBZ#2440630",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440630"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-23216",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23216",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23216"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2026021800-CVE-2026-23216-6c63@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2026021800-CVE-2026-23216-6c63@gregkh/T"
        }
      ],
      "release_date": "2026-02-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        },
        {
          "category": "workaround",
          "details": "To mitigate this issue, prevent the iscsi_target_mod module from being loaded. See https://access.redhat.com/solutions/41278 for instructions on how to blacklist kernel modules.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()"
    },
    {
      "cve": "CVE-2026-23231",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2026-03-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2444376"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A local attacker with CAP_NET_ADMIN capabilities, or remote packet traffic, could exploit a use-after-free vulnerability in the nf_tables_addchain() function\u0027s error handling. Successful exploitation could lead to a kernel crash, resulting in a Denial of Service (DoS), or potentially privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "A use after free can occur in nf_tables_addchain error handling because a new chain is published to table chains via RCU before hook registration completes and is then freed without an RCU grace period when hook registration fails. This creates a race with RCU readers in the control plane such as nf_tables_dump_chains and also with in flight packet evaluation when an IPv4 hook is transiently installed for NFPROTO_INET and later IPv6 hook registration fails. For the CVSS the PR is L because a local actor with CAP_NET_ADMIN can induce the failing add chain path while remote packet traffic may hit the transient hook and trigger the UAF window. Impact ranges from a kernel crash to potential privilege escalation.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
          "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
          "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
          "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-23231"
        },
        {
          "category": "external",
          "summary": "RHBZ#2444376",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-23231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23231"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T"
        }
      ],
      "release_date": "2026-03-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T10:34:03+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:10756"
        },
        {
          "category": "workaround",
          "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, it is recommended to disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.src",
            "7Server-RT-ELS:kernel-rt-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debug-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-doc-0:3.10.0-1160.148.1.rt56.1300.el7.noarch",
            "7Server-RT-ELS:kernel-rt-trace-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-debuginfo-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64",
            "7Server-RT-ELS:kernel-rt-trace-devel-0:3.10.0-1160.148.1.rt56.1300.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…