{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory {CVE-2025-39883}\n- comedi: aio_iiro_16: Fix bit shift out of bounds {CVE-2025-38529}\n- comedi: das6402: Fix bit shift out of bounds {CVE-2025-38482}\n- comedi: pcl812: Fix bit shift out of bounds {CVE-2025-38530}\n- comedi: das16m1: Fix bit shift out of bounds {CVE-2025-38483}\n- tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). {CVE-2025-40186}\n- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}\n- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}\n- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285}\n- sctp: avoid NULL dereference when chunk data buffer is missing {CVE-2025-40240}\n- smb: client: let recv_done verify data_offset, data_length and remaining_data_length {CVE-2025-39933}\n- vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}\n- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping {CVE-2025-40154}\n- Bluetooth: hci_event: call disconnect callback before deleting conn {CVE-2023-53673}\n- net: fix information leakage in /proc/net/ptype {CVE-2022-48757}\n- net/mlx5e: fix a potential double-free in fs_any_create_groups {CVE-2023-52667}\n- mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update {CVE-2024-35855}\n- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}\n- crypto: qat - resolve race condition during AER recovery {CVE-2024-26974}\n- perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835}\n- ext4: fix double-free of blocks due to wrong extents moved_len {CVE-2024-26704}\n- stm class: Fix a double free in stm_register_device() {CVE-2024-38627}\n- pinctrl: core: delete incorrect free in pinctrl_enable() {CVE-2024-36940}\n- ipvlan: add ipvlan_route_v6_outbound() helper {CVE-2023-52796}\n- wifi: ath11k: fix gtk offload status event locking {CVE-2023-52777}\n- ice: fix memory corruption bug with suspend and rebuild {CVE-2024-35911}\n- drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' {CVE-2024-27042}\n- drm/i915/vma: Fix UAF on destroy against retire race {CVE-2024-26939}\n- netfilter: nf_tables: prefer nft_chain_validate {CVE-2024-41042}\n- Bluetooth: Fix potential use-after-free when clear keys {CVE-2023-53386}\n- drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] {CVE-2024-46815}\n- drm/amd/display: Check pipe offset before setting vblank {CVE-2024-42120}\n- nbd: fix incomplete validation of ioctl arg {CVE-2023-53513}\n- RDMA/rxe: Fix incomplete state save in rxe_requester {CVE-2023-53539}\n- netfilter: nftables: exthdr: fix 4-byte stack OOB write\n- net: ppp: Add bound checking for skb data on ppp_sync_txmung {CVE-2025-37749}\n- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}\n- iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid {CVE-2025-37927}\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277}\n- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() {CVE-2025-38724}\n- RDMA/rxe: Fix mr->map double free {CVE-2022-50543}\n- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}\n- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}\n- RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug {CVE-2025-38024}\n- drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies {CVE-2025-40096}\n- HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() {CVE-2025-38103}\n- drm/i915: mark requests for GuC virtual engines to avoid use-after-free {CVE-2023-53552}\n- net: atlantic: fix fragment overflow handling in RX path {CVE-2025-68301}\n- net: atm: add lec_mutex {CVE-2025-38323}\n- net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789}\n- scsi: lpfc: Fix buffer free/clear order in deferred receive path {CVE-2025-39841}\n- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}\n- tracing: Fix oob write in trace_seq_to_buffer() {CVE-2025-37923}\n- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}\n- ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346}\n- tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). {CVE-2025-39955}\n- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}\n- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}\n- ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249}\n- md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445}\n- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}\n- bpf: Avoid __bpf_prog_ret0_warn when jit fails {CVE-2025-38280}\n- vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618}\n- fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos-stream8els/advisories/2026/clsa-2026_1770032032.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
      }
    ],
    "tracking": {
      "current_release_date": "2026-02-02T11:41:51Z",
      "generator": {
        "date": "2026-02-02T11:41:51Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1770032032",
      "initial_release_date": "2026-02-02T11:41:51Z",
      "revision_history": [
        {
          "date": "2026-02-02T11:41:51Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "kernel: Fix of 63 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 8",
                "product": {
                  "name": "Community Enterprise Operating System 8",
                  "product_id": "CentOS-Stream-8",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:8:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python3-perf@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules-internal@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-selftests-internal@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-core@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-ipaclones-internal@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-core@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-cross-headers@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules-extra@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules-extra@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                "product": {
                  "name": "kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_id": "kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules-internal@4.18.0-553.6.1.el8_10.tuxcare.els15?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        },
        "product_reference": "kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
        "relates_to_product_reference": "CentOS-Stream-8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-27042",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'\n\nThe issue arises when the array 'adev->vcn.vcn_config' is accessed\nbefore checking if the index 'adev->vcn.num_vcn_inst' is within the\nbounds of the array.\n\nThe fix involves moving the bounds check before the array access. This\nensures that 'adev->vcn.num_vcn_inst' is within the bounds of the array\nbefore it is used as an index.\n\nFixes the below:\ndrivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev->vcn.num_vcn_inst' after use.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-27042"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8db10cee51e3e11a6658742465edc21986cf1e8d",
          "url": "https://git.kernel.org/stable/c/8db10cee51e3e11a6658742465edc21986cf1e8d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f3e68c6a3fff53c2240762a47a0045d89371775",
          "url": "https://git.kernel.org/stable/c/8f3e68c6a3fff53c2240762a47a0045d89371775"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058",
          "url": "https://git.kernel.org/stable/c/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cdb637d339572398821204a1142d8d615668f1e9",
          "url": "https://git.kernel.org/stable/c/cdb637d339572398821204a1142d8d615668f1e9"
        }
      ],
      "release_date": "2024-05-01T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37789",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix nested key length validation in the set() action\n\nIt's not safe to access nla_len(ovs_key) if the data is smaller than\nthe netlink header.  Check that the attribute is OK first.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37789"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b",
          "url": "https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec",
          "url": "https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce",
          "url": "https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba",
          "url": "https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd",
          "url": "https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7",
          "url": "https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4",
          "url": "https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc",
          "url": "https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52796",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: add ipvlan_route_v6_outbound() helper\n\nInspired by syzbot reports using a stack of multiple ipvlan devices.\n\nReduce stack size needed in ipvlan_process_v6_outbound() by moving\nthe flowi6 struct used for the route lookup in an non inlined\nhelper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,\nimmediately reclaimed.\n\nAlso make sure ipvlan_process_v4_outbound() is not inlined.\n\nWe might also have to lower MAX_NEST_DEV, because only syzbot uses\nsetups with more than four stacked devices.\n\nBUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)\nstack guard page: 0000 [#1] SMP KASAN\nCPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023\nRIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188\nCode: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89\nRSP: 0018:ffffc9000e804000 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2\nRDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568\nRBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c\nR13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000\nFS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<#DF>\n</#DF>\n<TASK>\n[<ffffffff81f281d1>] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31\n[<ffffffff817e5bf2>] instrument_atomic_read include/linux/instrumented.h:72 [inline]\n[<ffffffff817e5bf2>] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]\n[<ffffffff817e5bf2>] cpumask_test_cpu include/linux/cpumask.h:506 [inline]\n[<ffffffff817e5bf2>] cpu_online include/linux/cpumask.h:1092 [inline]\n[<ffffffff817e5bf2>] trace_lock_acquire include/trace/events/lock.h:24 [inline]\n[<ffffffff817e5bf2>] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632\n[<ffffffff8563221e>] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306\n[<ffffffff8561464d>] rcu_read_lock include/linux/rcupdate.h:747 [inline]\n[<ffffffff8561464d>] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221\n[<ffffffff85618120>] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606\n[<ffffffff856f65b5>] pol_lookup_func include/net/ip6_fib.h:584 [inline]\n[<ffffffff856f65b5>] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116\n[<ffffffff85618009>] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638\n[<ffffffff8561821a>] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651\n[<ffffffff838bd5a3>] ip6_route_output include/net/ip6_route.h:100 [inline]\n[<ffffffff838bd5a3>] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]\n[<ffffffff838bd5a3>] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]\n[<ffffffff838bd5a3>] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n[<ffffffff838bd5a3>] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677\n[<ffffffff838c2909>] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229\n[<ffffffff84d03900>] netdev_start_xmit include/linux/netdevice.h:4966 [inline]\n[<ffffffff84d03900>] xmit_one net/core/dev.c:3644 [inline]\n[<ffffffff84d03900>] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660\n[<ffffffff84d080e2>] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324\n[<ffffffff855ce4cd>] dev_queue_xmit include/linux/netdevice.h:3067 [inline]\n[<ffffffff855ce4cd>] neigh_hh_output include/net/neighbour.h:529 [inline]\n[<f\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52796"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458",
          "url": "https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18f039428c7df183b09c69ebf10ffd4e521035d2",
          "url": "https://git.kernel.org/stable/c/18f039428c7df183b09c69ebf10ffd4e521035d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f",
          "url": "https://git.kernel.org/stable/c/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/43b781e7cb5cd0b435de276111953bf2bacd1f02",
          "url": "https://git.kernel.org/stable/c/43b781e7cb5cd0b435de276111953bf2bacd1f02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4d2d30f0792b47908af64c4d02ed1ee25ff50542",
          "url": "https://git.kernel.org/stable/c/4d2d30f0792b47908af64c4d02ed1ee25ff50542"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4f7f850611aa27aaaf1bf5687702ad2240ae442a",
          "url": "https://git.kernel.org/stable/c/4f7f850611aa27aaaf1bf5687702ad2240ae442a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/732a67ca436887b594ebc43bb5a04ffb0971a760",
          "url": "https://git.kernel.org/stable/c/732a67ca436887b594ebc43bb5a04ffb0971a760"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8872dc638c24bb774cd2224a69d72a7f661a4d56",
          "url": "https://git.kernel.org/stable/c/8872dc638c24bb774cd2224a69d72a7f661a4d56"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52667",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: fix a potential double-free in fs_any_create_groups\n\nWhen kcalloc() for ft->g succeeds but kvzalloc() for in fails,\nfs_any_create_groups() will free ft->g. However, its caller\nfs_any_create_table() will free ft->g again through calling\nmlx5e_destroy_flow_table(), which will lead to a double-free.\nFix this by setting ft->g to NULL in fs_any_create_groups().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52667"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8",
          "url": "https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779",
          "url": "https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1",
          "url": "https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e",
          "url": "https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe",
          "url": "https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe"
        }
      ],
      "release_date": "2024-05-17T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26704",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix double-free of blocks due to wrong extents moved_len\n\nIn ext4_move_extents(), moved_len is only updated when all moves are\nsuccessfully executed, and only discards orig_inode and donor_inode\npreallocations when moved_len is not zero. When the loop fails to exit\nafter successfully moving some extents, moved_len is not updated and\nremains at 0, so it does not discard the preallocations.\n\nIf the moved extents overlap with the preallocated extents, the\noverlapped extents are freed twice in ext4_mb_release_inode_pa() and\next4_process_freed_data() (as described in commit 94d7c16cbbbd (\"ext4:\nFix double-free of blocks with EXT4_IOC_MOVE_EXT\")), and bb_free is\nincremented twice. Hence when trim is executed, a zero-division bug is\ntriggered in mb_update_avg_fragment_size() because bb_free is not zero\nand bb_fragments is zero.\n\nTherefore, update move_len after each extent move to avoid the issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26704"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1",
          "url": "https://git.kernel.org/stable/c/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2883940b19c38d5884c8626483811acf4d7e148f",
          "url": "https://git.kernel.org/stable/c/2883940b19c38d5884c8626483811acf4d7e148f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/55583e899a5357308274601364741a83e78d6ac4",
          "url": "https://git.kernel.org/stable/c/55583e899a5357308274601364741a83e78d6ac4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6",
          "url": "https://git.kernel.org/stable/c/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1",
          "url": "https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/afbcad9ae7d6d11608399188f03a837451b6b3a1",
          "url": "https://git.kernel.org/stable/c/afbcad9ae7d6d11608399188f03a837451b6b3a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4fbb89d722cbb16beaaea234b7230faaaf68c71",
          "url": "https://git.kernel.org/stable/c/b4fbb89d722cbb16beaaea234b7230faaaf68c71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d033a555d9a1cf53dbf3301af7199cc4a4c8f537",
          "url": "https://git.kernel.org/stable/c/d033a555d9a1cf53dbf3301af7199cc4a4c8f537"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-04-03T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26939",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915/vma: Fix UAF on destroy against retire race\n\nObject debugging tools were sporadically reporting illegal attempts to\nfree a still active i915 VMA object when parking a GT believed to be idle.\n\n[161.359441] ODEBUG: free active (active state 0) object: ffff88811643b958 object type: i915_active hint: __i915_vma_active+0x0/0x50 [i915]\n[161.360082] WARNING: CPU: 5 PID: 276 at lib/debugobjects.c:514 debug_print_object+0x80/0xb0\n...\n[161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 Not tainted 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1\n[161.360314] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022\n[161.360322] Workqueue: i915-unordered __intel_wakeref_put_work [i915]\n[161.360592] RIP: 0010:debug_print_object+0x80/0xb0\n...\n[161.361347] debug_object_free+0xeb/0x110\n[161.361362] i915_active_fini+0x14/0x130 [i915]\n[161.361866] release_references+0xfe/0x1f0 [i915]\n[161.362543] i915_vma_parked+0x1db/0x380 [i915]\n[161.363129] __gt_park+0x121/0x230 [i915]\n[161.363515] ____intel_wakeref_put_last+0x1f/0x70 [i915]\n\nThat has been tracked down to be happening when another thread is\ndeactivating the VMA inside __active_retire() helper, after the VMA's\nactive counter has been already decremented to 0, but before deactivation\nof the VMA's object is reported to the object debugging tool.\n\nWe could prevent from that race by serializing i915_active_fini() with\n__active_retire() via ref->tree_lock, but that wouldn't stop the VMA from\nbeing used, e.g. from __i915_vma_retire() called at the end of\n__active_retire(), after that VMA has been already freed by a concurrent\ni915_vma_destroy() on return from the i915_active_fini().  Then, we should\nrather fix the issue at the VMA level, not in i915_active.\n\nSince __i915_vma_parked() is called from __gt_park() on last put of the\nGT's wakeref, the issue could be addressed by holding the GT wakeref long\nenough for __active_retire() to complete before that wakeref is released\nand the GT parked.\n\nI believe the issue was introduced by commit d93939730347 (\"drm/i915:\nRemove the vma refcount\") which moved a call to i915_active_fini() from\na dropped i915_vma_release(), called on last put of the removed VMA kref,\nto i915_vma_parked() processing path called on last put of a GT wakeref.\nHowever, its visibility to the object debugging tool was suppressed by a\nbug in i915_active that was fixed two weeks later with commit e92eb246feb9\n(\"drm/i915/active: Fix missing debug object activation\").\n\nA VMA associated with a request doesn't acquire a GT wakeref by itself.\nInstead, it depends on a wakeref held directly by the request's active\nintel_context for a GT associated with its VM, and indirectly on that\nintel_context's engine wakeref if the engine belongs to the same GT as the\nVMA's VM.  Those wakerefs are released asynchronously to VMA deactivation.\n\nFix the issue by getting a wakeref for the VMA's GT when activating it,\nand putting that wakeref only after the VMA is deactivated.  However,\nexclude global GTT from that processing path, otherwise the GPU never goes\nidle.  Since __i915_vma_retire() may be called from atomic contexts, use\nasync variant of wakeref put.  Also, to avoid circular locking dependency,\ntake care of acquiring the wakeref before VM mutex when both are needed.\n\nv7: Add inline comments with justifications for:\n    - using untracked variants of intel_gt_pm_get/put() (Nirmoy),\n    - using async variant of _put(),\n    - not getting the wakeref in case of a global GTT,\n    - always getting the first wakeref outside vm->mutex.\nv6: Since __i915_vma_active/retire() callbacks are not serialized, storing\n    a wakeref tracking handle inside struct i915_vma is not safe, and\n    there is no other good place for that.  Use untracked variants of\n    intel_gt_pm_get/put_async().\nv5: Replace \"tile\" with \"GT\" across commit description (Rodrigo),\n  - \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26939"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e",
          "url": "https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f",
          "url": "https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5",
          "url": "https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190",
          "url": "https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190"
        }
      ],
      "release_date": "2024-05-01T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-35855",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update\n\nThe rule activity update delayed work periodically traverses the list of\nconfigured rules and queries their activity from the device.\n\nAs part of this task it accesses the entry pointed by 'ventry->entry',\nbut this entry can be changed concurrently by the rehash delayed work,\nleading to a use-after-free [1].\n\nFix by closing the race and perform the activity query under the\n'vregion->lock' mutex.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\nRead of size 8 at addr ffff8881054ed808 by task kworker/0:18/181\n\nCPU: 0 PID: 181 Comm: kworker/0:18 Not tainted 6.9.0-rc2-custom-00781-gd5ab772d32f7 #2\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_rule_activity_update_work\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\n mlxsw_sp_acl_rule_activity_update_work+0x219/0x400\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_entry_create+0x7b/0x1f0\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x30d/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3d7/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-35855"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b73f6e4ea770410a937a8db98f77e52594d23a0",
          "url": "https://git.kernel.org/stable/c/1b73f6e4ea770410a937a8db98f77e52594d23a0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4",
          "url": "https://git.kernel.org/stable/c/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b183b915beef818a25e3154d719ca015a1ae0770",
          "url": "https://git.kernel.org/stable/c/b183b915beef818a25e3154d719ca015a1ae0770"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a",
          "url": "https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c17976b42d546ee118ca300db559630ee96fb758",
          "url": "https://git.kernel.org/stable/c/c17976b42d546ee118ca300db559630ee96fb758"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e24d2487424779c02760ff50cd9021b8676e19ef",
          "url": "https://git.kernel.org/stable/c/e24d2487424779c02760ff50cd9021b8676e19ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/feabdac2057e863d0e140a2adf3d232eb4882db4",
          "url": "https://git.kernel.org/stable/c/feabdac2057e863d0e140a2adf3d232eb4882db4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        }
      ],
      "release_date": "2024-05-17T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37839",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: remove wrong sb->s_sequence check\n\nJournal emptiness is not determined by sb->s_sequence == 0 but rather by\nsb->s_start == 0 (which is set a few lines above). Furthermore 0 is a\nvalid transaction ID so the check can spuriously trigger. Remove the\ninvalid WARN_ON.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77",
          "url": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457",
          "url": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac",
          "url": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf",
          "url": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1",
          "url": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b",
          "url": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0",
          "url": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6",
          "url": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148",
          "url": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52835",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Bail out early if the request AUX area is out of bound\n\nWhen perf-record with a large AUX area, e.g 4GB, it fails with:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)\n\nand it reveals a WARNING with __alloc_pages():\n\n\t------------[ cut here ]------------\n\tWARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248\n\tCall trace:\n\t __alloc_pages+0x1ec/0x248\n\t __kmalloc_large_node+0xc0/0x1f8\n\t __kmalloc_node+0x134/0x1e8\n\t rb_alloc_aux+0xe0/0x298\n\t perf_mmap+0x440/0x660\n\t mmap_region+0x308/0x8a8\n\t do_mmap+0x3c0/0x528\n\t vm_mmap_pgoff+0xf4/0x1b8\n\t ksys_mmap_pgoff+0x18c/0x218\n\t __arm64_sys_mmap+0x38/0x58\n\t invoke_syscall+0x50/0x128\n\t el0_svc_common.constprop.0+0x58/0x188\n\t do_el0_svc+0x34/0x50\n\t el0_svc+0x34/0x108\n\t el0t_64_sync_handler+0xb8/0xc0\n\t el0t_64_sync+0x1a4/0x1a8\n\n'rb->aux_pages' allocated by kcalloc() is a pointer array which is used to\nmaintains AUX trace pages. The allocated page for this array is physically\ncontiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the\nsize of pointer array crosses the limitation set by MAX_ORDER, it reveals a\nWARNING.\n\nSo bail out early with -ENOMEM if the request AUX area is out of bound,\ne.g.:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52835"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece",
          "url": "https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a",
          "url": "https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb",
          "url": "https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916",
          "url": "https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734",
          "url": "https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f",
          "url": "https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a",
          "url": "https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a",
          "url": "https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39883",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory\n\nWhen I did memory failure tests, below panic occurs:\n\npage dumped because: VM_BUG_ON_PAGE(PagePoisoned(page))\nkernel BUG at include/linux/page-flags.h:616!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 720 Comm: bash Not tainted 6.10.0-rc1-00195-g148743902568 #40\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n unpoison_memory+0x2f3/0x590\n simple_attr_write_xsigned.constprop.0.isra.0+0xb3/0x110\n debugfs_attr_write+0x42/0x60\n full_proxy_write+0x5b/0x80\n vfs_write+0xd5/0x540\n ksys_write+0x64/0xe0\n do_syscall_64+0xb9/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f08f0314887\nRSP: 002b:00007ffece710078 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f08f0314887\nRDX: 0000000000000009 RSI: 0000564787a30410 RDI: 0000000000000001\nRBP: 0000564787a30410 R08: 000000000000fefe R09: 000000007fffffff\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009\nR13: 00007f08f041b780 R14: 00007f08f0417600 R15: 00007f08f0416a00\n </TASK>\nModules linked in: hwpoison_inject\n---[ end trace 0000000000000000 ]---\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nKernel panic - not syncing: Fatal exception\nKernel Offset: 0x31c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)\n---[ end Kernel panic - not syncing: Fatal exception ]---\n\nThe root cause is that unpoison_memory() tries to check the PG_HWPoison\nflags of an uninitialized page.  So VM_BUG_ON_PAGE(PagePoisoned(page)) is\ntriggered.  This can be reproduced by below steps:\n\n1.Offline memory block:\n\n echo offline > /sys/devices/system/memory/memory12/state\n\n2.Get offlined memory pfn:\n\n page-types -b n -rlN\n\n3.Write pfn to unpoison-pfn\n\n echo <pfn> > /sys/kernel/debug/hwpoison/unpoison-pfn\n\nThis scenario can be identified by pfn_to_online_page() returning NULL. \nAnd ZONE_DEVICE pages are never expected, so we can simply fail if\npfn_to_online_page() == NULL to fix the bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39883"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a",
          "url": "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96",
          "url": "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0",
          "url": "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a",
          "url": "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02",
          "url": "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da",
          "url": "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6",
          "url": "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
          "url": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-23T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38618",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Do not allow binding to VMADDR_PORT_ANY\n\nIt is possible for a vsock to autobind to VMADDR_PORT_ANY. This can\ncause a use-after-free when a connection is made to the bound socket.\nThe socket returned by accept() also has port VMADDR_PORT_ANY but is not\non the list of unbound sockets. Binding it will result in an extra\nrefcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep\nthe binding until socket destruction).\n\nModify the check in __vsock_bind_connectible() to also prevent binding\nto VMADDR_PORT_ANY.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38618"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32950b1907919be86a7a2697d6f93d57068b3865",
          "url": "https://git.kernel.org/stable/c/32950b1907919be86a7a2697d6f93d57068b3865"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44bd006d5c93f6a8f28b106cbae2428c5d0275b7",
          "url": "https://git.kernel.org/stable/c/44bd006d5c93f6a8f28b106cbae2428c5d0275b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f01093646b49f6330bb2d36761983fd829472b1",
          "url": "https://git.kernel.org/stable/c/8f01093646b49f6330bb2d36761983fd829472b1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aba0c94f61ec05315fa7815d21aefa4c87f6a9f4",
          "url": "https://git.kernel.org/stable/c/aba0c94f61ec05315fa7815d21aefa4c87f6a9f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c04a2c1ca25b9b23104124d3b2d349d934e302de",
          "url": "https://git.kernel.org/stable/c/c04a2c1ca25b9b23104124d3b2d349d934e302de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf86704798c1b9c46fa59dfc2d662f57d1394d79",
          "url": "https://git.kernel.org/stable/c/cf86704798c1b9c46fa59dfc2d662f57d1394d79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1a5b1964cef42727668ac0d8532dae4f8c19386",
          "url": "https://git.kernel.org/stable/c/d1a5b1964cef42727668ac0d8532dae4f8c19386"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d73960f0cf03ef1dc9e96ec7a20e538accc26d87",
          "url": "https://git.kernel.org/stable/c/d73960f0cf03ef1dc9e96ec7a20e538accc26d87"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f138be5d7f301fddad4e65ec66dfc3ceebf79be3",
          "url": "https://git.kernel.org/stable/c/f138be5d7f301fddad4e65ec66dfc3ceebf79be3"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-22T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38245",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().\n\nsyzbot reported a warning below during atm_dev_register(). [0]\n\nBefore creating a new device and procfs/sysfs for it, atm_dev_register()\nlooks up a duplicated device by __atm_dev_lookup().  These operations are\ndone under atm_dev_mutex.\n\nHowever, when removing a device in atm_dev_deregister(), it releases the\nmutex just after removing the device from the list that __atm_dev_lookup()\niterates over.\n\nSo, there will be a small race window where the device does not exist on\nthe device list but procfs/sysfs are still not removed, triggering the\nsplat.\n\nLet's hold the mutex until procfs/sysfs are removed in\natm_dev_deregister().\n\n[0]:\nproc_dir_entry 'atm/atmtcp:0' already registered\nWARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377\nModules linked in:\nCPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nRIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377\nCode: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 <0f> 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48\nRSP: 0018:ffffc9000466fa30 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248\nRDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001\nRBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140\nR13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444\nFS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n proc_create_data+0xbe/0x110 fs/proc/generic.c:585\n atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361\n atm_dev_register+0x46d/0x890 net/atm/resources.c:113\n atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369\n atmtcp_attach drivers/atm/atmtcp.c:403 [inline]\n atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x115/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f38b3b74459\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459\nRDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005\nRBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f\nR10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac\nR13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38245"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c",
          "url": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439",
          "url": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec",
          "url": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a",
          "url": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c",
          "url": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4",
          "url": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e",
          "url": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896",
          "url": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50543",
      "cwe": {
        "id": "CWE-1341",
        "name": "Multiple Releases of Same Resource or Handle"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nRDMA/rxe: Fix mr->map double free\nrxe_mr_cleanup() which tries to free mr->map again will be called when\nrxe_mr_init_user() fails:\nCPU: 0 PID: 4917 Comm: rdma_flush_serv Kdump: loaded Not tainted 6.1.0-rc1-roce-flush+ #25\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n<TASK>\ndump_stack_lvl+0x45/0x5d\npanic+0x19e/0x349\nend_report.part.0+0x54/0x7c\nkasan_report.cold+0xa/0xf\nrxe_mr_cleanup+0x9d/0xf0 [rdma_rxe]\n__rxe_cleanup+0x10a/0x1e0 [rdma_rxe]\nrxe_reg_user_mr+0xb7/0xd0 [rdma_rxe]\nib_uverbs_reg_mr+0x26a/0x480 [ib_uverbs]\nib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x1a2/0x250 [ib_uverbs]\nib_uverbs_cmd_verbs+0x1397/0x15a0 [ib_uverbs]\nThis issue was firstly exposed since commit b18c7da63fcb (\"RDMA/rxe: Fix\nmemory leak in error path code\") and then we fixed it in commit\n8ff5f5d9d8cf (\"RDMA/rxe: Prevent double freeing rxe_map_set()\") but this\nfix was reverted together at last by commit 1e75550648da (Revert\n\"RDMA/rxe: Create duplicate mapping tables for FMRs\")\nSimply let rxe_mr_cleanup() always handle freeing the mr->map once it is\nsuccessfully allocated.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50543"
        }
      ],
      "release_date": "2025-10-07T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40186",
      "cwe": {
        "id": "CWE-826",
        "name": "Premature Release of Resource During Expected Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ntcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().\nsyzbot reported the splat below in tcp_conn_request(). [0]\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk->sk.\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req->rsk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\nLet's remove reqsk_fastopen_remove() in tcp_conn_request().\nNote that other callers make sure tp->fastopen_rsk is not NULL.\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff <0f> 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS:  00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n<IRQ>\ntcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\ntcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\ntcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\ntcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\nip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\nip6_input (net/ipv6/ip6_input.c:500)\nipv6_rcv (net/ipv6/ip6_input.c:311)\n__netif_receive_skb (net/core/dev.c:6104)\nprocess_backlog (net/core/dev.c:6456)\n__napi_poll (net/core/dev.c:7506)\nnet_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\nhandle_softirqs (kernel/softirq.c:579)\ndo_softirq (kernel/softirq.c:480)\n</IRQ>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40186"
        }
      ],
      "release_date": "2025-11-12T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39841",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: lpfc: Fix buffer free/clear order in deferred receive path\nFix a use-after-free window by correcting the buffer release sequence in\nthe deferred receive path. The code freed the RQ buffer first and only\nthen cleared the context pointer under the lock. Concurrent paths (e.g.,\nABTS and the repost path) also inspect and release the same pointer under\nthe lock, so the old order could lead to double-free/UAF.\nNote that the repost path already uses the correct pattern: detach the\npointer under the lock, then free it after dropping the lock. The\ndeferred path should do the same.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39841"
        }
      ],
      "release_date": "2025-09-19T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53673",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nBluetooth: hci_event: call disconnect callback before deleting conn\nIn hci_cs_disconnect, we do hci_conn_del even if disconnection failed.\nISO, L2CAP and SCO connections refer to the hci_conn without\nhci_conn_get, so disconn_cfm must be called so they can clean up their\nconn, otherwise use-after-free occurs.\nISO:\n==========================================================\niso_sock_connect:880: sk 00000000eabd6557\niso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da\n...\niso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073\nhci_dev_put:1487: hci0 orig refcnt 17\n__iso_chan_add:214: conn 00000000b6251073\niso_sock_clear_timer:117: sock 00000000eabd6557 state 3\n...\nhci_rx_work:4085: hci0 Event packet\nhci_event_packet:7601: hci0: event 0x0f\nhci_cmd_status_evt:4346: hci0: opcode 0x0406\nhci_cs_disconnect:2760: hci0: status 0x0c\nhci_sent_cmd_data:3107: hci0 opcode 0x0406\nhci_conn_del:1151: hci0 hcon 000000001696f1fd handle 2560\nhci_conn_unlink:1102: hci0: hcon 000000001696f1fd\nhci_conn_drop:1451: hcon 00000000d8521aaf orig refcnt 2\nhci_chan_list_flush:2780: hcon 000000001696f1fd\nhci_dev_put:1487: hci0 orig refcnt 21\nhci_dev_put:1487: hci0 orig refcnt 20\nhci_req_cmd_complete:3978: opcode 0x0406 status 0x0c\n... <no iso_* activity on sk/conn> ...\niso_sock_sendmsg:1098: sock 00000000dea5e2e0, sk 00000000eabd6557\nBUG: kernel NULL pointer dereference, address: 0000000000000668\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014\nRIP: 0010:iso_sock_sendmsg (net/bluetooth/iso.c:1112) bluetooth\n==========================================================\nL2CAP:\n==================================================================\nhci_cmd_status_evt:4359: hci0: opcode 0x0406\nhci_cs_disconnect:2760: hci0: status 0x0c\nhci_sent_cmd_data:3085: hci0 opcode 0x0406\nhci_conn_del:1151: hci0 hcon ffff88800c999000 handle 3585\nhci_conn_unlink:1102: hci0: hcon ffff88800c999000\nhci_chan_list_flush:2780: hcon ffff88800c999000\nhci_chan_del:2761: hci0 hcon ffff88800c999000 chan ffff888018ddd280\n...\nBUG: KASAN: slab-use-after-free in hci_send_acl+0x2d/0x540 [bluetooth]\nRead of size 8 at addr ffff888018ddd298 by task bluetoothd/1175\nCPU: 0 PID: 1175 Comm: bluetoothd Tainted: G            E      6.4.0-rc4+ #2\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014\nCall Trace:\n<TASK>\ndump_stack_lvl+0x5b/0x90\nprint_report+0xcf/0x670\n? __virt_addr_valid+0xf8/0x180\n? hci_send_acl+0x2d/0x540 [bluetooth]\nkasan_report+0xa8/0xe0\n? hci_send_acl+0x2d/0x540 [bluetooth]\nhci_send_acl+0x2d/0x540 [bluetooth]\n? __pfx___lock_acquire+0x10/0x10\nl2cap_chan_send+0x1fd/0x1300 [bluetooth]\n? l2cap_sock_sendmsg+0xf2/0x170 [bluetooth]\n? __pfx_l2cap_chan_send+0x10/0x10 [bluetooth]\n? lock_release+0x1d5/0x3c0\n? mark_held_locks+0x1a/0x90\nl2cap_sock_sendmsg+0x100/0x170 [bluetooth]\nsock_write_iter+0x275/0x280\n? __pfx_sock_write_iter+0x10/0x10\n? __pfx___lock_acquire+0x10/0x10\ndo_iter_readv_writev+0x176/0x220\n? __pfx_do_iter_readv_writev+0x10/0x10\n? find_held_lock+0x83/0xa0\n? selinux_file_permission+0x13e/0x210\ndo_iter_write+0xda/0x340\nvfs_writev+0x1b4/0x400\n? __pfx_vfs_writev+0x10/0x10\n? __seccomp_filter+0x112/0x750\n? populate_seccomp_data+0x182/0x220\n? __fget_light+0xdf/0x100\n? do_writev+0x19d/0x210\ndo_writev+0x19d/0x210\n? __pfx_do_writev+0x10/0x10\n? mark_held_locks+0x1a/0x90\ndo_syscall_64+0x60/0x90\n? lockdep_hardirqs_on_prepare+0x149/0x210\n? do_syscall_64+0x6c/0x90\n? lockdep_hardirqs_on_prepare+0x149/0x210\nentry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7ff45cb23e64\nCode: 15 d1 1f 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d 9d a7 0d 00 00 74 13 b8 14 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89\nRSP: 002b:00007fff21ae09b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000014\nRAX: ffffffffffffffda RBX: \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53673"
        }
      ],
      "release_date": "2025-10-07T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39863",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work\n\nThe brcmf_btcoex_detach() only shuts down the btcoex timer, if the\nflag timer_on is false. However, the brcmf_btcoex_timerfunc(), which\nruns as timer handler, sets timer_on to false. This creates critical\nrace conditions:\n\n1.If brcmf_btcoex_detach() is called while brcmf_btcoex_timerfunc()\nis executing, it may observe timer_on as false and skip the call to\ntimer_shutdown_sync().\n\n2.The brcmf_btcoex_timerfunc() may then reschedule the brcmf_btcoex_info\nworker after the cancel_work_sync() has been executed, resulting in\nuse-after-free bugs.\n\nThe use-after-free bugs occur in two distinct scenarios, depending on\nthe timing of when the brcmf_btcoex_info struct is freed relative to\nthe execution of its worker thread.\n\nScenario 1: Freed before the worker is scheduled\n\nThe brcmf_btcoex_info is deallocated before the worker is scheduled.\nA race condition can occur when schedule_work(&bt_local->work) is\ncalled after the target memory has been freed. The sequence of events\nis detailed below:\n\nCPU0                           | CPU1\nbrcmf_btcoex_detach            | brcmf_btcoex_timerfunc\n                               |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)   |\n    ...                        |\n  cancel_work_sync();          |\n  ...                          |\n  kfree(cfg->btcoex); // FREE  |\n                               |   schedule_work(&bt_local->work); // USE\n\nScenario 2: Freed after the worker is scheduled\n\nThe brcmf_btcoex_info is freed after the worker has been scheduled\nbut before or during its execution. In this case, statements within\nthe brcmf_btcoex_handler() — such as the container_of macro and\nsubsequent dereferences of the brcmf_btcoex_info object will cause\na use-after-free access. The following timeline illustrates this\nscenario:\n\nCPU0                            | CPU1\nbrcmf_btcoex_detach             | brcmf_btcoex_timerfunc\n                                |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)    |\n    ...                         |\n  cancel_work_sync();           |\n  ...                           |   schedule_work(); // Reschedule\n                                |\n  kfree(cfg->btcoex); // FREE   |   brcmf_btcoex_handler() // Worker\n  /*                            |     btci = container_of(....); // USE\n   The kfree() above could      |     ...\n   also occur at any point      |     btci-> // USE\n   during the worker's execution|\n   */                           |\n\nTo resolve the race conditions, drop the conditional check and call\ntimer_shutdown_sync() directly. It can deactivate the timer reliably,\nregardless of its current state. Once stopped, the timer_on state is\nthen set to false.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39863"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625",
          "url": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7",
          "url": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc",
          "url": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63",
          "url": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38280",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Avoid __bpf_prog_ret0_warn when jit fails\n\nsyzkaller reported an issue:\n\nWARNING: CPU: 3 PID: 217 at kernel/bpf/core.c:2357 __bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357\nModules linked in:\nCPU: 3 UID: 0 PID: 217 Comm: kworker/u32:6 Not tainted 6.15.0-rc4-syzkaller-00040-g8bac8898fe39\nRIP: 0010:__bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357\nCall Trace:\n <TASK>\n bpf_dispatcher_nop_func include/linux/bpf.h:1316 [inline]\n __bpf_prog_run include/linux/filter.h:718 [inline]\n bpf_prog_run include/linux/filter.h:725 [inline]\n cls_bpf_classify+0x74a/0x1110 net/sched/cls_bpf.c:105\n ...\n\nWhen creating bpf program, 'fp->jit_requested' depends on bpf_jit_enable.\nThis issue is triggered because of CONFIG_BPF_JIT_ALWAYS_ON is not set\nand bpf_jit_enable is set to 1, causing the arch to attempt JIT the prog,\nbut jit failed due to FAULT_INJECTION. As a result, incorrectly\ntreats the program as valid, when the program runs it calls\n`__bpf_prog_ret0_warn` and triggers the WARN_ON_ONCE(1).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38280"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0b9bb52796b239de6792d0d68cdc6eb505ebff96",
          "url": "https://git.kernel.org/stable/c/0b9bb52796b239de6792d0d68cdc6eb505ebff96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2bc6dffb4b72d53d6a6ada510269bf548c3f7ae0",
          "url": "https://git.kernel.org/stable/c/2bc6dffb4b72d53d6a6ada510269bf548c3f7ae0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f639c25bfad17d9fd7379ab91ff9678ea9aac85",
          "url": "https://git.kernel.org/stable/c/6f639c25bfad17d9fd7379ab91ff9678ea9aac85"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/86bc9c742426a16b52a10ef61f5b721aecca2344",
          "url": "https://git.kernel.org/stable/c/86bc9c742426a16b52a10ef61f5b721aecca2344"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e7fb4ebee6e900899d2b2e5852c3e2eafcbcad66",
          "url": "https://git.kernel.org/stable/c/e7fb4ebee6e900899d2b2e5852c3e2eafcbcad66"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef92b96530d1731d9ac167bc7c193c683cd78fff",
          "url": "https://git.kernel.org/stable/c/ef92b96530d1731d9ac167bc7c193c683cd78fff"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38530",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl812: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & board->irq_bits) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38530"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0489c30d080f07cc7f09d04de723d8c2ccdb61ef",
          "url": "https://git.kernel.org/stable/c/0489c30d080f07cc7f09d04de723d8c2ccdb61ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862",
          "url": "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29ef03e5b84431171d6b77b822985b54bc44b793",
          "url": "https://git.kernel.org/stable/c/29ef03e5b84431171d6b77b822985b54bc44b793"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/374d9b3eb4b08407997ef1fce96119d31e0c0bc4",
          "url": "https://git.kernel.org/stable/c/374d9b3eb4b08407997ef1fce96119d31e0c0bc4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416",
          "url": "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a",
          "url": "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4",
          "url": "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632",
          "url": "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-35911",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix memory corruption bug with suspend and rebuild\n\nThe ice driver would previously panic after suspend. This is caused\nfrom the driver *only* calling the ice_vsi_free_q_vectors() function by\nitself, when it is suspending. Since commit b3e7b3a6ee92 (\"ice: prevent\nNULL pointer deref during reload\") the driver has zeroed out\nnum_q_vectors, and only restored it in ice_vsi_cfg_def().\n\nThis further causes the ice_rebuild() function to allocate a zero length\nbuffer, after which num_q_vectors is updated, and then the new value of\nnum_q_vectors is used to index into the zero length buffer, which\ncorrupts memory.\n\nThe fix entails making sure all the code referencing num_q_vectors only\ndoes so after it has been reset via ice_vsi_cfg_def().\n\nI didn't perform a full bisect, but I was able to test against 6.1.77\nkernel and that ice driver works fine for suspend/resume with no panic,\nso sometime since then, this problem was introduced.\n\nAlso clean up an un-needed init of a local variable in the function\nbeing modified.\n\nPANIC from 6.8.0-rc1:\n\n[1026674.915596] PM: suspend exit\n[1026675.664697] ice 0000:17:00.1: PTP reset successful\n[1026675.664707] ice 0000:17:00.1: 2755 msecs passed between update to cached PHC time\n[1026675.667660] ice 0000:b1:00.0: PTP reset successful\n[1026675.675944] ice 0000:b1:00.0: 2832 msecs passed between update to cached PHC time\n[1026677.137733] ixgbe 0000:31:00.0 ens787: NIC Link is Up 1 Gbps, Flow Control: None\n[1026677.190201] BUG: kernel NULL pointer dereference, address: 0000000000000010\n[1026677.192753] ice 0000:17:00.0: PTP reset successful\n[1026677.192764] ice 0000:17:00.0: 4548 msecs passed between update to cached PHC time\n[1026677.197928] #PF: supervisor read access in kernel mode\n[1026677.197933] #PF: error_code(0x0000) - not-present page\n[1026677.197937] PGD 1557a7067 P4D 0\n[1026677.212133] ice 0000:b1:00.1: PTP reset successful\n[1026677.212143] ice 0000:b1:00.1: 4344 msecs passed between update to cached PHC time\n[1026677.212575]\n[1026677.243142] Oops: 0000 [#1] PREEMPT SMP NOPTI\n[1026677.247918] CPU: 23 PID: 42790 Comm: kworker/23:0 Kdump: loaded Tainted: G        W          6.8.0-rc1+ #1\n[1026677.257989] Hardware name: Intel Corporation M50CYP2SBSTD/M50CYP2SBSTD, BIOS SE5C620.86B.01.01.0005.2202160810 02/16/2022\n[1026677.269367] Workqueue: ice ice_service_task [ice]\n[1026677.274592] RIP: 0010:ice_vsi_rebuild_set_coalesce+0x130/0x1e0 [ice]\n[1026677.281421] Code: 0f 84 3a ff ff ff 41 0f b7 74 ec 02 66 89 b0 22 02 00 00 81 e6 ff 1f 00 00 e8 ec fd ff ff e9 35 ff ff ff 48 8b 43 30 49 63 ed <41> 0f b7 34 24 41 83 c5 01 48 8b 3c e8 66 89 b7 aa 02 00 00 81 e6\n[1026677.300877] RSP: 0018:ff3be62a6399bcc0 EFLAGS: 00010202\n[1026677.306556] RAX: ff28691e28980828 RBX: ff28691e41099828 RCX: 0000000000188000\n[1026677.314148] RDX: 0000000000000000 RSI: 0000000000000010 RDI: ff28691e41099828\n[1026677.321730] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000\n[1026677.329311] R10: 0000000000000007 R11: ffffffffffffffc0 R12: 0000000000000010\n[1026677.336896] R13: 0000000000000000 R14: 0000000000000000 R15: ff28691e0eaa81a0\n[1026677.344472] FS:  0000000000000000(0000) GS:ff28693cbffc0000(0000) knlGS:0000000000000000\n[1026677.353000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[1026677.359195] CR2: 0000000000000010 CR3: 0000000128df4001 CR4: 0000000000771ef0\n[1026677.366779] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[1026677.374369] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[1026677.381952] PKRU: 55555554\n[1026677.385116] Call Trace:\n[1026677.388023]  <TASK>\n[1026677.390589]  ? __die+0x20/0x70\n[1026677.394105]  ? page_fault_oops+0x82/0x160\n[1026677.398576]  ? do_user_addr_fault+0x65/0x6a0\n[1026677.403307]  ? exc_page_fault+0x6a/0x150\n[1026677.407694]  ? asm_exc_page_fault+0x22/0x30\n[1026677.412349]  ? ice_vsi_rebuild_set_coalesce+0x130/0x1e0 [ice]\n[1026677.4186\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-35911"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11ff8392943e08a35cb0aa19d638b02db745f170",
          "url": "https://git.kernel.org/stable/c/11ff8392943e08a35cb0aa19d638b02db745f170"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1cb7fdb1dfde1aab66780b4ba44dba6402172111",
          "url": "https://git.kernel.org/stable/c/1cb7fdb1dfde1aab66780b4ba44dba6402172111"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e40a02f06ceb0e0b0183e0b973ac5dbf8f75edec",
          "url": "https://git.kernel.org/stable/c/e40a02f06ceb0e0b0183e0b973ac5dbf8f75edec"
        }
      ],
      "release_date": "2024-05-19T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26974",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - resolve race condition during AER recovery\n\nDuring the PCI AER system's error recovery process, the kernel driver\nmay encounter a race condition with freeing the reset_data structure's\nmemory. If the device restart will take more than 10 seconds the function\nscheduling that restart will exit due to a timeout, and the reset_data\nstructure will be freed. However, this data structure is used for\ncompletion notification after the restart is completed, which leads\nto a UAF bug.\n\nThis results in a KFENCE bug notice.\n\n  BUG: KFENCE: use-after-free read in adf_device_reset_worker+0x38/0xa0 [intel_qat]\n  Use-after-free read at 0x00000000bc56fddf (in kfence-#142):\n  adf_device_reset_worker+0x38/0xa0 [intel_qat]\n  process_one_work+0x173/0x340\n\nTo resolve this race condition, the memory associated to the container\nof the work_struct is freed on the worker if the timeout expired,\notherwise on the function that schedules the worker.\nThe timeout detection can be done by checking if the caller is\nstill waiting for completion or not by using completion_done() function.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26974"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be",
          "url": "https://git.kernel.org/stable/c/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7",
          "url": "https://git.kernel.org/stable/c/226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4ae5a97781ce7d6ecc9c7055396535815b64ca4f",
          "url": "https://git.kernel.org/stable/c/4ae5a97781ce7d6ecc9c7055396535815b64ca4f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d42e097607c4d246d99225bf2b195b6167a210c",
          "url": "https://git.kernel.org/stable/c/7d42e097607c4d246d99225bf2b195b6167a210c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc",
          "url": "https://git.kernel.org/stable/c/8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e81cd58aee14a470891733181a47d123193ba81",
          "url": "https://git.kernel.org/stable/c/8e81cd58aee14a470891733181a47d123193ba81"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb279ead42263e9fb09480f02a4247b2c287d828",
          "url": "https://git.kernel.org/stable/c/bb279ead42263e9fb09480f02a4247b2c287d828"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d03092550f526a79cf1ade7f0dfa74906f39eb71",
          "url": "https://git.kernel.org/stable/c/d03092550f526a79cf1ade7f0dfa74906f39eb71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/daba62d9eeddcc5b1081be7d348ca836c83c59d7",
          "url": "https://git.kernel.org/stable/c/daba62d9eeddcc5b1081be7d348ca836c83c59d7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-05-01T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-41042",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via ->validate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can't see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don't have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table->validate_state in case we could catch an error earlier\n(for improved error reporting to userspace).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-41042"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f",
          "url": "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b",
          "url": "https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0",
          "url": "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e",
          "url": "https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae",
          "url": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe",
          "url": "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24",
          "url": "https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c",
          "url": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-07-29T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38483",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: das16m1: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\t/* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */\n\tif ((1 << it->options[1]) & 0xdcfc) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38483"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077",
          "url": "https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c",
          "url": "https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288",
          "url": "https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0",
          "url": "https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1",
          "url": "https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b",
          "url": "https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932",
          "url": "https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269",
          "url": "https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-36940",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-36940"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068",
          "url": "https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca",
          "url": "https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79",
          "url": "https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c",
          "url": "https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d",
          "url": "https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e",
          "url": "https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd",
          "url": "https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba",
          "url": "https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-05-30T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53552",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndrm/i915: mark requests for GuC virtual engines to avoid use-after-free\nReferences to i915_requests may be trapped by userspace inside a\nsync_file or dmabuf (dma-resv) and held indefinitely across different\nproceses. To counter-act the memory leaks, we try to not to keep\nreferences from the request past their completion.\nOn the other side on fence release we need to know if rq->engine\nis valid and points to hw engine (true for non-virtual requests).\nTo make it possible extra bit has been added to rq->execution_mask,\nfor marking virtual engines.\n(cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53552"
        }
      ],
      "release_date": "2025-10-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26982",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check the inode number is not the invalid value of zero\n\nSyskiller has produced an out of bounds access in fill_meta_index().\n\nThat out of bounds access is ultimately caused because the inode\nhas an inode number with the invalid value of zero, which was not checked.\n\nThe reason this causes the out of bounds access is due to following\nsequence of events:\n\n1. Fill_meta_index() is called to allocate (via empty_meta_index())\n   and fill a metadata index.  It however suffers a data read error\n   and aborts, invalidating the newly returned empty metadata index.\n   It does this by setting the inode number of the index to zero,\n   which means unused (zero is not a valid inode number).\n\n2. When fill_meta_index() is subsequently called again on another\n   read operation, locate_meta_index() returns the previous index\n   because it matches the inode number of 0.  Because this index\n   has been returned it is expected to have been filled, and because\n   it hasn't been, an out of bounds access is performed.\n\nThis patch adds a sanity check which checks that the inode number\nis not zero when the inode is created and returns -EINVAL if it is.\n\n[phillip@squashfs.org.uk: whitespace fix]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26982"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7",
          "url": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94",
          "url": "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013",
          "url": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
          "url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
          "url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
          "url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f",
          "url": "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"
        }
      ],
      "release_date": "2024-05-01T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38445",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid1: Fix stack memory use after return in raid1_reshape\n\nIn the raid1_reshape function, newpool is\nallocated on the stack and assigned to conf->r1bio_pool.\nThis results in conf->r1bio_pool.wait.head pointing\nto a stack address.\nAccessing this address later can lead to a kernel panic.\n\nExample access path:\n\nraid1_reshape()\n{\n\t// newpool is on the stack\n\tmempool_t newpool, oldpool;\n\t// initialize newpool.wait.head to stack address\n\tmempool_init(&newpool, ...);\n\tconf->r1bio_pool = newpool;\n}\n\nraid1_read_request() or raid1_write_request()\n{\n\talloc_r1bio()\n\t{\n\t\tmempool_alloc()\n\t\t{\n\t\t\t// if pool->alloc fails\n\t\t\tremove_element()\n\t\t\t{\n\t\t\t\t--pool->curr_nr;\n\t\t\t}\n\t\t}\n\t}\n}\n\nmempool_free()\n{\n\tif (pool->curr_nr < pool->min_nr) {\n\t\t// pool->wait.head is a stack address\n\t\t// wake_up() will try to access this invalid address\n\t\t// which leads to a kernel panic\n\t\treturn;\n\t\twake_up(&pool->wait);\n\t}\n}\n\nFix:\nreinit conf->r1bio_pool.wait after assigning newpool.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38445"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12b00ec99624f8da8c325f2dd6e807df26df0025",
          "url": "https://git.kernel.org/stable/c/12b00ec99624f8da8c325f2dd6e807df26df0025"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/48da050b4f54ed639b66278d0ae6f4107b2c4e2d",
          "url": "https://git.kernel.org/stable/c/48da050b4f54ed639b66278d0ae6f4107b2c4e2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f35e48b76655e45522df338876dfef88dafcc71",
          "url": "https://git.kernel.org/stable/c/5f35e48b76655e45522df338876dfef88dafcc71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61fd5e93006cf82ec8ee5c115ab5cf4bbd104bdb",
          "url": "https://git.kernel.org/stable/c/61fd5e93006cf82ec8ee5c115ab5cf4bbd104bdb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/776e6186dc9ecbdb8a1b706e989166c8a99bbf64",
          "url": "https://git.kernel.org/stable/c/776e6186dc9ecbdb8a1b706e989166c8a99bbf64"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d67ed2ccd2d1dcfda9292c0ea8697a9d0f2f0d98",
          "url": "https://git.kernel.org/stable/c/d67ed2ccd2d1dcfda9292c0ea8697a9d0f2f0d98"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8a6853d00fbaa810765c8ed2f452a5832273968",
          "url": "https://git.kernel.org/stable/c/d8a6853d00fbaa810765c8ed2f452a5832273968"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df5894014a92ff0196dbc212a7764e97366fd2b7",
          "url": "https://git.kernel.org/stable/c/df5894014a92ff0196dbc212a7764e97366fd2b7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38482",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: das6402: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\t/* IRQs 2,3,5,6,7, 10,11,15 are valid for \"enhanced\" mode */\n\tif ((1 << it->options[1]) & 0x8cec) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38482"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca",
          "url": "https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4",
          "url": "https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac",
          "url": "https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a",
          "url": "https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513",
          "url": "https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406",
          "url": "https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df",
          "url": "https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80",
          "url": "https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38403",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/vmci: Clear the vmci transport packet properly when initializing it\n\nIn vmci_transport_packet_init memset the vmci_transport_packet before\npopulating the fields to avoid any uninitialised data being left in the\nstructure.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38403"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1",
          "url": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d",
          "url": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0",
          "url": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5",
          "url": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e",
          "url": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a",
          "url": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839",
          "url": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce",
          "url": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38157",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Abort software beacon handling if disabled\n\nA malicious USB device can send a WMI_SWBA_EVENTID event from an\nath9k_htc-managed device before beaconing has been enabled. This causes\na device-by-zero error in the driver, leading to either a crash or an\nout of bounds read.\n\nPrevent this by aborting the handling in ath9k_htc_swba() if beacons are\nnot enabled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc",
          "url": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0",
          "url": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e",
          "url": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46",
          "url": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605",
          "url": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c",
          "url": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54",
          "url": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a",
          "url": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38323",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: add lec_mutex\n\nsyzbot found its way in net/atm/lec.c, and found an error path\nin lecd_attach() could leave a dangling pointer in dev_lec[].\n\nAdd a mutex to protect dev_lecp[] uses from lecd_attach(),\nlec_vcc_attach() and lec_mcast_attach().\n\nFollowing patch will use this mutex for /proc/net/atm/lec.\n\nBUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]\nBUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\nRead of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142\n\nCPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:94 [inline]\n  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n  print_address_description mm/kasan/report.c:408 [inline]\n  print_report+0xcd/0x680 mm/kasan/report.c:521\n  kasan_report+0xe0/0x110 mm/kasan/report.c:634\n  lecd_attach net/atm/lec.c:751 [inline]\n  lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n </TASK>\n\nAllocated by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n  kasan_kmalloc include/linux/kasan.h:260 [inline]\n  __do_kmalloc_node mm/slub.c:4328 [inline]\n  __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015\n  alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711\n  lecd_attach net/atm/lec.c:737 [inline]\n  lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576\n  poison_slab_object mm/kasan/common.c:247 [inline]\n  __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264\n  kasan_slab_free include/linux/kasan.h:233 [inline]\n  slab_free_hook mm/slub.c:2381 [inline]\n  slab_free mm/slub.c:4643 [inline]\n  kfree+0x2b4/0x4d0 mm/slub.c:4842\n  free_netdev+0x6c5/0x910 net/core/dev.c:11892\n  lecd_attach net/atm/lec.c:744 [inline]\n  lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38323"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8",
          "url": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a",
          "url": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424",
          "url": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192",
          "url": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67",
          "url": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8",
          "url": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b",
          "url": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e",
          "url": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-42120",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check pipe offset before setting vblank\n\npipe_ctx has a size of MAX_PIPES so checking its index before accessing\nthe array.\n\nThis fixes an OVERRUN issue reported by Coverity.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-42120"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0b3702f9d43d163fd05e43b7d7e22e766dbef329",
          "url": "https://git.kernel.org/stable/c/0b3702f9d43d163fd05e43b7d7e22e766dbef329"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5396a70e8cf462ec5ccf2dc8de103c79de9489e6",
          "url": "https://git.kernel.org/stable/c/5396a70e8cf462ec5ccf2dc8de103c79de9489e6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/96bf81cc1bd058bb8af6e755a548e926e934dfd1",
          "url": "https://git.kernel.org/stable/c/96bf81cc1bd058bb8af6e755a548e926e934dfd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2e9abc95583ac7bbb2c47da4d476a798146dfd6",
          "url": "https://git.kernel.org/stable/c/b2e9abc95583ac7bbb2c47da4d476a798146dfd6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5ec2afeeee4c91cebc4eff6d4f1ecf4047259f4",
          "url": "https://git.kernel.org/stable/c/c5ec2afeeee4c91cebc4eff6d4f1ecf4047259f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d2c3645a4a5ae5d933b4116c305d9d82b8199dbf",
          "url": "https://git.kernel.org/stable/c/d2c3645a4a5ae5d933b4116c305d9d82b8199dbf"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-07-30T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38024",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcf/0x610 mm/kasan/report.c:489\n kasan_report+0xb5/0xe0 mm/kasan/report.c:602\n rxe_queue_cleanup+0xd0/0xe0 drivers/infiniband/sw/rxe/rxe_queue.c:195\n rxe_cq_cleanup+0x3f/0x50 drivers/infiniband/sw/rxe/rxe_cq.c:132\n __rxe_cleanup+0x168/0x300 drivers/infiniband/sw/rxe/rxe_pool.c:232\n rxe_create_cq+0x22e/0x3a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1109\n create_cq+0x658/0xb90 drivers/infiniband/core/uverbs_cmd.c:1052\n ib_uverbs_create_cq+0xc7/0x120 drivers/infiniband/core/uverbs_cmd.c:1095\n ib_uverbs_write+0x969/0xc90 drivers/infiniband/core/uverbs_main.c:679\n vfs_write fs/read_write.c:677 [inline]\n vfs_write+0x26a/0xcc0 fs/read_write.c:659\n ksys_write+0x1b8/0x200 fs/read_write.c:731\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nIn the function rxe_create_cq, when rxe_cq_from_init fails, the function\nrxe_cleanup will be called to handle the allocated resources. In fact,\nsome memory resources have already been freed in the function\nrxe_cq_from_init. Thus, this problem will occur.\n\nThe solution is to let rxe_cleanup do all the work.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38024"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16c45ced0b3839d3eee72a86bb172bef6cf58980",
          "url": "https://git.kernel.org/stable/c/16c45ced0b3839d3eee72a86bb172bef6cf58980"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/336edd6b0f5b7fbffc3e065285610624f59e88df",
          "url": "https://git.kernel.org/stable/c/336edd6b0f5b7fbffc3e065285610624f59e88df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a3b73e135e3bd18423d0baa72571319c7feb759",
          "url": "https://git.kernel.org/stable/c/3a3b73e135e3bd18423d0baa72571319c7feb759"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591",
          "url": "https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c7c80c32e00665234e373ab03fe82f5c5c2c230",
          "url": "https://git.kernel.org/stable/c/7c7c80c32e00665234e373ab03fe82f5c5c2c230"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee4c5a2a38596d548566560c0c022ab797e6f71a",
          "url": "https://git.kernel.org/stable/c/ee4c5a2a38596d548566560c0c022ab797e6f71a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f81b33582f9339d2dc17c69b92040d3650bb4bae",
          "url": "https://git.kernel.org/stable/c/f81b33582f9339d2dc17c69b92040d3650bb4bae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8f470e3a757425a8f98fb9a5991e3cf62fc7134",
          "url": "https://git.kernel.org/stable/c/f8f470e3a757425a8f98fb9a5991e3cf62fc7134"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38103",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()\n\nUpdate struct hid_descriptor to better reflect the mandatory and\noptional parts of the HID Descriptor as per USB HID 1.11 specification.\nNote: the kernel currently does not parse any optional HID class\ndescriptors, only the mandatory report descriptor.\n\nUpdate all references to member element desc[0] to rpt_desc.\n\nAdd test to verify bLength and bNumDescriptors values are valid.\n\nReplace the for loop with direct access to the mandatory HID class\ndescriptor member for the report descriptor. This eliminates the\npossibility of getting an out-of-bounds fault.\n\nAdd a warning message if the HID descriptor contains any unsupported\noptional HID class descriptors.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38103"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0",
          "url": "https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb",
          "url": "https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf",
          "url": "https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e",
          "url": "https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de",
          "url": "https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b",
          "url": "https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345",
          "url": "https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed",
          "url": "https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37749",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ppp: Add bound checking for skb data on ppp_sync_txmung\n\nEnsure we have enough data in linear buffer from skb before accessing\ninitial bytes. This prevents potential out-of-bounds accesses\nwhen processing short packets.\n\nWhen ppp_sync_txmung receives an incoming package with an empty\npayload:\n(remote) gef➤  p *(struct pppoe_hdr *) (skb->head + skb->network_header)\n$18 = {\n\ttype = 0x1,\n\tver = 0x1,\n\tcode = 0x0,\n\tsid = 0x2,\n        length = 0x0,\n\ttag = 0xffff8880371cdb96\n}\n\nfrom the skb struct (trimmed)\n      tail = 0x16,\n      end = 0x140,\n      head = 0xffff88803346f400 \"4\",\n      data = 0xffff88803346f416 \":\\377\",\n      truesize = 0x380,\n      len = 0x0,\n      data_len = 0x0,\n      mac_len = 0xe,\n      hdr_len = 0x0,\n\nit is not safe to access data[2].\n\n[pabeni@redhat.com: fixed subj typo]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37749"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f6eb9fa87a781d5370c0de7794ae242f1a95ee5",
          "url": "https://git.kernel.org/stable/c/1f6eb9fa87a781d5370c0de7794ae242f1a95ee5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/529401c8f12ecc35f9ea5d946d5a5596cf172b48",
          "url": "https://git.kernel.org/stable/c/529401c8f12ecc35f9ea5d946d5a5596cf172b48"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e8a6bf43cea4347121ab21bb1ed8d7bef7e732e",
          "url": "https://git.kernel.org/stable/c/6e8a6bf43cea4347121ab21bb1ed8d7bef7e732e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99aa698dec342a07125d733e39aab4394b3b7e05",
          "url": "https://git.kernel.org/stable/c/99aa698dec342a07125d733e39aab4394b3b7e05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aabc6596ffb377c4c9c8f335124b92ea282c9821",
          "url": "https://git.kernel.org/stable/c/aabc6596ffb377c4c9c8f335124b92ea282c9821"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4c836d33ca888695b2f2665f948bc1b34fbd533",
          "url": "https://git.kernel.org/stable/c/b4c836d33ca888695b2f2665f948bc1b34fbd533"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b78f2b458f56a5a4d976c8e01c43dbf58d3ea2ca",
          "url": "https://git.kernel.org/stable/c/b78f2b458f56a5a4d976c8e01c43dbf58d3ea2ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de5a4f0cba58625e88b7bebd88f780c8c0150997",
          "url": "https://git.kernel.org/stable/c/de5a4f0cba58625e88b7bebd88f780c8c0150997"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fbaffe8bccf148ece8ad67eb5d7aa852cabf59c8",
          "url": "https://git.kernel.org/stable/c/fbaffe8bccf148ece8ad67eb5d7aa852cabf59c8"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38198",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Make sure modelist not set on unregistered console\n\nIt looks like attempting to write to the \"store_modes\" sysfs node will\nrun afoul of unregistered consoles:\n\nUBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28\nindex -1 is out of range for type 'fb_info *[32]'\n...\n fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122\n fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048\n fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673\n store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113\n dev_attr_store+0x55/0x80 drivers/base/core.c:2439\n\nstatic struct fb_info *fbcon_registered_fb[FB_MAX];\n...\nstatic signed char con2fb_map[MAX_NR_CONSOLES];\n...\nstatic struct fb_info *fbcon_info_from_console(int console)\n...\n        return fbcon_registered_fb[con2fb_map[console]];\n\nIf con2fb_map contains a -1 things go wrong here. Instead, return NULL,\nas callers of fbcon_info_from_console() are trying to compare against\nexisting \"info\" pointers, so error handling should kick in correctly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38198"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc",
          "url": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b",
          "url": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b",
          "url": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8",
          "url": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd",
          "url": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38459",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: clip: Fix infinite recursive call of clip_push().\n\nsyzbot reported the splat below. [0]\n\nThis happens if we call ioctl(ATMARP_MKIP) more than once.\n\nDuring the first call, clip_mkip() sets clip_push() to vcc->push(),\nand the second call copies it to clip_vcc->old_push().\n\nLater, when the socket is close()d, vcc_destroy_socket() passes\nNULL skb to clip_push(), which calls clip_vcc->old_push(),\ntriggering the infinite recursion.\n\nLet's prevent the second ioctl(ATMARP_MKIP) by checking\nvcc->user_back, which is allocated by the first call as clip_vcc.\n\nNote also that we use lock_sock() to prevent racy calls.\n\n[0]:\nBUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)\nOops: stack guard page: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191\nCode: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <41> 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00\nRSP: 0018:ffffc9000d670000 EFLAGS: 00010246\nRAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000\nRBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e\nR10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300\nR13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578\nFS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0\nCall Trace:\n <TASK>\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n...\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n vcc_destroy_socket net/atm/common.c:183 [inline]\n vcc_release+0x157/0x460 net/atm/common.c:205\n __sock_release net/socket.c:647 [inline]\n sock_close+0xc0/0x240 net/socket.c:1391\n __fput+0x449/0xa70 fs/file_table.c:465\n task_work_run+0x1d1/0x260 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114\n exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]\n do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7ff31c98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f\nR10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c\nR13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090\n </TASK>\nModules linked in:",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38459"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e",
          "url": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352",
          "url": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f",
          "url": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31",
          "url": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8",
          "url": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45",
          "url": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88",
          "url": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2",
          "url": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38249",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()\n\nIn snd_usb_get_audioformat_uac3(), the length value returned from\nsnd_usb_ctl_msg() is used directly for memory allocation without\nvalidation. This length is controlled by the USB device.\n\nThe allocated buffer is cast to a uac3_cluster_header_descriptor\nand its fields are accessed without verifying that the buffer\nis large enough. If the device returns a smaller than expected\nlength, this leads to an out-of-bounds read.\n\nAdd a length check to ensure the buffer is large enough for\nuac3_cluster_header_descriptor.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38249"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0ee87c2814deb5e42921281116ac3abcb326880b",
          "url": "https://git.kernel.org/stable/c/0ee87c2814deb5e42921281116ac3abcb326880b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36",
          "url": "https://git.kernel.org/stable/c/11e740dc1a2c8590eb7074b5c4ab921bb6224c36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/24ff7d465c4284529bbfa207757bffb6f44b6403",
          "url": "https://git.kernel.org/stable/c/24ff7d465c4284529bbfa207757bffb6f44b6403"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2dc1c3edf67abd30c757f8054a5da61927cdda21",
          "url": "https://git.kernel.org/stable/c/2dc1c3edf67abd30c757f8054a5da61927cdda21"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6eb211788e1370af52a245d4d7da35c374c7b401",
          "url": "https://git.kernel.org/stable/c/6eb211788e1370af52a245d4d7da35c374c7b401"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8",
          "url": "https://git.kernel.org/stable/c/74fcb3852a2f579151ce80b9ed96cd916ba0d5d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3fb926abe90d86f5e3055e0035f04d9892a118b",
          "url": "https://git.kernel.org/stable/c/c3fb926abe90d86f5e3055e0035f04d9892a118b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a",
          "url": "https://git.kernel.org/stable/c/fb4e2a6e8f28a3c0ad382e363aeb9cd822007b8a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37927",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid\n\nThere is a string parsing logic error which can lead to an overflow of hid\nor uid buffers. Comparing ACPIID_LEN against a total string length doesn't\ntake into account the lengths of individual hid and uid buffers so the\ncheck is insufficient in some cases. For example if the length of hid\nstring is 4 and the length of the uid string is 260, the length of str\nwill be equal to ACPIID_LEN + 1 but uid string will overflow uid buffer\nwhich size is 256.\n\nThe same applies to the hid string with length 13 and uid string with\nlength 250.\n\nCheck the length of hid and uid strings separately to prevent\nbuffer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37927"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718",
          "url": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29",
          "url": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1",
          "url": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5",
          "url": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c",
          "url": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e",
          "url": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f",
          "url": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f",
          "url": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38724",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n\nLei Lu recently reported that nfsd4_setclientid_confirm() did not check\nthe return value from get_client_locked(). a SETCLIENTID_CONFIRM could\nrace with a confirmed client expiring and fail to get a reference. That\ncould later lead to a UAF.\n\nFix this by getting a reference early in the case where there is an\nextant confirmed client. If that fails then treat it as if there were no\nconfirmed client found at all.\n\nIn the case where the unconfirmed client is expiring, just fail and\nreturn the result from get_client_locked().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38724"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1",
          "url": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3",
          "url": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d",
          "url": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1",
          "url": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306",
          "url": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68",
          "url": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b",
          "url": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
          "url": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0",
          "url": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52777",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: fix gtk offload status event locking\n\nThe ath11k active pdevs are protected by RCU but the gtk offload status\nevent handling code calling ath11k_mac_get_arvif_by_vdev_id() was not\nmarked as a read-side critical section.\n\nMark the code in question as an RCU read-side critical section to avoid\nany potential use-after-free issues.\n\nCompile tested only.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52777"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d",
          "url": "https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221",
          "url": "https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca",
          "url": "https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a",
          "url": "https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48757",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix information leakage in /proc/net/ptype\n\nIn one net namespace, after creating a packet socket without binding\nit to a device, users in other net namespaces can observe the new\n`packet_type` added by this packet socket by reading `/proc/net/ptype`\nfile. This is minor information leakage as packet socket is\nnamespace aware.\n\nAdd a net pointer in `packet_type` to keep the net namespace of\nof corresponding packet socket. In `ptype_seq_show`, this net pointer\nmust be checked when it is not NULL.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48757"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/47934e06b65637c88a762d9c98329ae6e3238888",
          "url": "https://git.kernel.org/stable/c/47934e06b65637c88a762d9c98329ae6e3238888"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/839ec7039513a4f84bfbaff953a9393471176bee",
          "url": "https://git.kernel.org/stable/c/839ec7039513a4f84bfbaff953a9393471176bee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f88c78d24f6f346919007cd459fd7e51a8c7779",
          "url": "https://git.kernel.org/stable/c/8f88c78d24f6f346919007cd459fd7e51a8c7779"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b67ad6170c0ea87391bb253f35d1f78857736e54",
          "url": "https://git.kernel.org/stable/c/b67ad6170c0ea87391bb253f35d1f78857736e54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be1ca30331c7923c6f376610c1bd6059be9b1908",
          "url": "https://git.kernel.org/stable/c/be1ca30331c7923c6f376610c1bd6059be9b1908"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c38023032a598ec6263e008d62c7f02def72d5c7",
          "url": "https://git.kernel.org/stable/c/c38023032a598ec6263e008d62c7f02def72d5c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db044d97460ea792110eb8b971e82569ded536c6",
          "url": "https://git.kernel.org/stable/c/db044d97460ea792110eb8b971e82569ded536c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092",
          "url": "https://git.kernel.org/stable/c/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
          "url": "https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b"
        }
      ],
      "release_date": "2024-06-20T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38627",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(&stm->dev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38627"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20",
          "url": "https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459",
          "url": "https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247",
          "url": "https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931",
          "url": "https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b",
          "url": "https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36",
          "url": "https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695",
          "url": "https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be",
          "url": "https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-06-21T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37923",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix oob write in trace_seq_to_buffer()\n\nsyzbot reported this bug:\n==================================================================\nBUG: KASAN: slab-out-of-bounds in trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\nBUG: KASAN: slab-out-of-bounds in tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\nWrite of size 4507 at addr ffff888032b6b000 by task syz.2.320/7260\n\nCPU: 1 UID: 0 PID: 7260 Comm: syz.2.320 Not tainted 6.15.0-rc1-syzkaller-00301-g3bde70a2c827 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xc3/0x670 mm/kasan/report.c:521\n kasan_report+0xe0/0x110 mm/kasan/report.c:634\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189\n __asan_memcpy+0x3c/0x60 mm/kasan/shadow.c:106\n trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\n tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\n ....\n==================================================================\n\nIt has been reported that trace_seq_to_buffer() tries to copy more data\nthan PAGE_SIZE to buf. Therefore, to prevent this, we should use the\nsmaller of trace_seq_used(&iter->seq) and PAGE_SIZE as an argument.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37923"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897",
          "url": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f",
          "url": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d",
          "url": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157",
          "url": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9",
          "url": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4",
          "url": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606",
          "url": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb",
          "url": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53539",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nRDMA/rxe: Fix incomplete state save in rxe_requester\nIf a send packet is dropped by the IP layer in rxe_requester()\nthe call to rxe_xmit_packet() can fail with err == -EAGAIN.\nTo recover, the state of the wqe is restored to the state before\nthe packet was sent so it can be resent. However, the routines\nthat save and restore the state miss a significnt part of the\nvariable state in the wqe, the dma struct which is used to process\nthrough the sge table. And, the state is not saved before the packet\nis built which modifies the dma struct.\nUnder heavy stress testing with many QPs on a fast node sending\nlarge messages to a slow node dropped packets are observed and\nthe resent packets are corrupted because the dma struct was not\nrestored. This patch fixes this behavior and allows the test cases\nto succeed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53539"
        }
      ],
      "release_date": "2025-10-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38051",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x53/0x70\n  print_report+0xce/0x640\n  kasan_report+0xb8/0xf0\n  cifs_fill_dirent+0xb03/0xb60 [cifs]\n  cifs_readdir+0x12cb/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\n f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n  </TASK>\n\n Allocated by task 408:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  __kasan_slab_alloc+0x6e/0x70\n  kmem_cache_alloc_noprof+0x117/0x3d0\n  mempool_alloc_noprof+0xf2/0x2c0\n  cifs_buf_get+0x36/0x80 [cifs]\n  allocate_buffers+0x1d2/0x330 [cifs]\n  cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n  kthread+0x394/0x720\n  ret_from_fork+0x34/0x70\n  ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3b/0x60\n  __kasan_slab_free+0x37/0x50\n  kmem_cache_free+0x2b8/0x500\n  cifs_buf_release+0x3c/0x70 [cifs]\n  cifs_readdir+0x1c97/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents64+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n  which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n  freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                             ^\n  ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1                       Process 2\n-----------------------------------\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38051"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
          "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
          "url": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
          "url": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
          "url": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
          "url": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
          "url": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
          "url": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
          "url": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38212",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough.  If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38212"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9",
          "url": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c",
          "url": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884",
          "url": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68",
          "url": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d",
          "url": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057",
          "url": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7",
          "url": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472",
          "url": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53513",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnbd: fix incomplete validation of ioctl arg\nWe tested and found an alarm caused by nbd_ioctl arg without verification.\nThe UBSAN warning calltrace like below:\nUBSAN: Undefined behaviour in fs/buffer.c:1709:35\nsigned integer overflow:\n-9223372036854775808 - 1 cannot be represented in type 'long long int'\nCPU: 3 PID: 2523 Comm: syz-executor.0 Not tainted 4.19.90 #1\nHardware name: linux,dummy-virt (DT)\nCall trace:\ndump_backtrace+0x0/0x3f0 arch/arm64/kernel/time.c:78\nshow_stack+0x28/0x38 arch/arm64/kernel/traps.c:158\n__dump_stack lib/dump_stack.c:77 [inline]\ndump_stack+0x170/0x1dc lib/dump_stack.c:118\nubsan_epilogue+0x18/0xb4 lib/ubsan.c:161\nhandle_overflow+0x188/0x1dc lib/ubsan.c:192\n__ubsan_handle_sub_overflow+0x34/0x44 lib/ubsan.c:206\n__block_write_full_page+0x94c/0xa20 fs/buffer.c:1709\nblock_write_full_page+0x1f0/0x280 fs/buffer.c:2934\nblkdev_writepage+0x34/0x40 fs/block_dev.c:607\n__writepage+0x68/0xe8 mm/page-writeback.c:2305\nwrite_cache_pages+0x44c/0xc70 mm/page-writeback.c:2240\ngeneric_writepages+0xdc/0x148 mm/page-writeback.c:2329\nblkdev_writepages+0x2c/0x38 fs/block_dev.c:2114\ndo_writepages+0xd4/0x250 mm/page-writeback.c:2344\nThe reason for triggering this warning is __block_write_full_page()\n-> i_size_read(inode) - 1 overflow.\ninode->i_size is assigned in __nbd_ioctl() -> nbd_set_size() -> bytesize.\nWe think it is necessary to limit the size of arg to prevent errors.\nMoreover, __nbd_ioctl() -> nbd_add_socket(), arg will be cast to int.\nAssuming the value of arg is 0x80000000000000001) (on a 64-bit machine),\nit will become 1 after the coercion, which will return unexpected results.\nFix it by adding checks to prevent passing in too large numbers.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53513"
        }
      ],
      "release_date": "2025-10-01T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38415",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check return result of sb_min_blocksize\n\nSyzkaller reports an \"UBSAN: shift-out-of-bounds in squashfs_bio_read\" bug.\n\nSyzkaller forks multiple processes which after mounting the Squashfs\nfilesystem, issues an ioctl(\"/dev/loop0\", LOOP_SET_BLOCK_SIZE, 0x8000). \nNow if this ioctl occurs at the same time another process is in the\nprocess of mounting a Squashfs filesystem on /dev/loop0, the failure\noccurs.  When this happens the following code in squashfs_fill_super()\nfails.\n\n----\nmsblk->devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);\nmsblk->devblksize_log2 = ffz(~msblk->devblksize);\n----\n\nsb_min_blocksize() returns 0, which means msblk->devblksize is set to 0.\n\nAs a result, ffz(~msblk->devblksize) returns 64, and msblk->devblksize_log2\nis set to 64.\n\nThis subsequently causes the\n\nUBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36\nshift exponent 64 is too large for 64-bit type 'u64' (aka\n'unsigned long long')\n\nThis commit adds a check for a 0 return by sb_min_blocksize().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38415"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425",
          "url": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282",
          "url": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b",
          "url": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
          "url": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68",
          "url": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25",
          "url": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84",
          "url": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497",
          "url": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38346",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix UAF when lookup kallsym after ftrace disabled\n\nThe following issue happens with a buggy module:\n\nBUG: unable to handle page fault for address: ffffffffc05d0218\nPGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0\nOops: Oops: 0000 [#1] SMP KASAN PTI\nTainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nRIP: 0010:sized_strscpy+0x81/0x2f0\nRSP: 0018:ffff88812d76fa08 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000\nRDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d\nRBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68\nR10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038\nR13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff\nFS:  00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ftrace_mod_get_kallsym+0x1ac/0x590\n update_iter_mod+0x239/0x5b0\n s_next+0x5b/0xa0\n seq_read_iter+0x8c9/0x1070\n seq_read+0x249/0x3b0\n proc_reg_read+0x1b0/0x280\n vfs_read+0x17f/0x920\n ksys_read+0xf3/0x1c0\n do_syscall_64+0x5f/0x2e0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue may happen as follows:\n(1) Add kprobe tracepoint;\n(2) insmod test.ko;\n(3)  Module triggers ftrace disabled;\n(4) rmmod test.ko;\n(5) cat /proc/kallsyms; --> Will trigger UAF as test.ko already removed;\nftrace_mod_get_kallsym()\n...\nstrscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n...\n\nThe problem is when a module triggers an issue with ftrace and\nsets ftrace_disable. The ftrace_disable is set when an anomaly is\ndiscovered and to prevent any more damage, ftrace stops all text\nmodification. The issue that happened was that the ftrace_disable stops\nmore than just the text modification.\n\nWhen a module is loaded, its init functions can also be traced. Because\nkallsyms deletes the init functions after a module has loaded, ftrace\nsaves them when the module is loaded and function tracing is enabled. This\nallows the output of the function trace to show the init function names\ninstead of just their raw memory addresses.\n\nWhen a module is removed, ftrace_release_mod() is called, and if\nftrace_disable is set, it just returns without doing anything more. The\nproblem here is that it leaves the mod_list still around and if kallsyms\nis called, it will call into this code and access the module memory that\nhas already been freed as it will return:\n\n  strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n\nWhere the \"mod\" no longer exists and triggers a UAF bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb",
          "url": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9",
          "url": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa",
          "url": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71",
          "url": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c",
          "url": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb",
          "url": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129",
          "url": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d",
          "url": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40154",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40154"
        }
      ],
      "release_date": "2025-11-12T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40240",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nsctp: avoid NULL dereference when chunk data buffer is missing\nchunk->skb pointer is dereferenced in the if-block where it's supposed\nto be NULL only.\nchunk->skb can only be NULL if chunk->head_skb is not. Check for frag_list\ninstead and do it just before replacing chunk->skb. We're sure that\notherwise chunk->skb is non-NULL because of outer if() condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40240"
        }
      ],
      "release_date": "2025-12-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-46815",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]\n\n[WHY & HOW]\nnum_valid_sets needs to be checked to avoid a negative index when\naccessing reader_wm_sets[num_valid_sets - 1].\n\nThis fixes an OVERRUN issue reported by Coverity.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-46815"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf",
          "url": "https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0",
          "url": "https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b",
          "url": "https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267",
          "url": "https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996",
          "url": "https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb",
          "url": "https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492",
          "url": "https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-09-27T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37823",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don't have a reliable reproducer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e",
          "url": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc",
          "url": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e",
          "url": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf",
          "url": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290",
          "url": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09",
          "url": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c",
          "url": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a",
          "url": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39955",
      "cwe": {
        "id": "CWE-213",
        "name": "Exposure of Sensitive Information Due to Incompatible Policies"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ntcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().\nsyzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk\nin the TCP_ESTABLISHED state. [0]\nsyzbot reused the server-side TCP Fast Open socket as a new client before\nthe TFO socket completes 3WHS:\n1. accept()\n2. connect(AF_UNSPEC)\n3. connect() to another destination\nAs of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes\nit to TCP_CLOSE and makes connect() possible, which restarts timers.\nSince tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the\nretransmit timer triggered the warning and the intended packet was not\nretransmitted.\nLet's call reqsk_fastopen_remove() in tcp_disconnect().\n[0]:\nWARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))\nModules linked in:\nCPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))\nCode: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 <0f> 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e\nRSP: 0018:ffffc900002f8d40 EFLAGS: 00010293\nRAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017\nRDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400\nRBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8\nR10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540\nR13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0\nFS:  0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0\nCall Trace:\n<IRQ>\ntcp_write_timer (net/ipv4/tcp_timer.c:738)\ncall_timer_fn (kernel/time/timer.c:1747)\n__run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372)\ntimer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135)\ntmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035)\n__walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1))\ntmigr_handle_remote (kernel/time/timer_migration.c:1096)\nhandle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580)\nirq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696)\nsysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35))\n</IRQ>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39955"
        }
      ],
      "release_date": "2025-10-09T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-68285",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nlibceph: fix potential use-after-free in have_mon_and_osd_map()\nThe wait loop in __ceph_open_session() can race with the client\nreceiving a new monmap or osdmap shortly after the initial map is\nreceived.  Both ceph_monc_handle_map() and handle_one_map() install\na new map immediately after freeing the old one\nkfree(monc->monmap);\nmonc->monmap = monmap;\nceph_osdmap_destroy(osdc->osdmap);\nosdc->osdmap = newmap;\nunder client->monc.mutex and client->osdc.lock respectively, but\nbecause neither is taken in have_mon_and_osd_map() it's possible for\nclient->monc.monmap->epoch and client->osdc.osdmap->epoch arms in\nclient->monc.monmap && client->monc.monmap->epoch &&\nclient->osdc.osdmap && client->osdc.osdmap->epoch;\ncondition to dereference an already freed map.  This happens to be\nreproducible with generic/395 and generic/397 with KASAN enabled:\nBUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70\nRead of size 4 at addr ffff88811012d810 by task mount.ceph/13305\nCPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266\n...\nCall Trace:\n<TASK>\nhave_mon_and_osd_map+0x56/0x70\nceph_open_session+0x182/0x290\nceph_get_tree+0x333/0x680\nvfs_get_tree+0x49/0x180\ndo_new_mount+0x1a3/0x2d0\npath_mount+0x6dd/0x730\ndo_mount+0x99/0xe0\n__do_sys_mount+0x141/0x180\ndo_syscall_64+0x9f/0x100\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\n</TASK>\nAllocated by task 13305:\nceph_osdmap_alloc+0x16/0x130\nceph_osdc_init+0x27a/0x4c0\nceph_create_client+0x153/0x190\ncreate_fs_client+0x50/0x2a0\nceph_get_tree+0xff/0x680\nvfs_get_tree+0x49/0x180\ndo_new_mount+0x1a3/0x2d0\npath_mount+0x6dd/0x730\ndo_mount+0x99/0xe0\n__do_sys_mount+0x141/0x180\ndo_syscall_64+0x9f/0x100\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nFreed by task 9475:\nkfree+0x212/0x290\nhandle_one_map+0x23c/0x3b0\nceph_osdc_handle_map+0x3c9/0x590\nmon_dispatch+0x655/0x6f0\nceph_con_process_message+0xc3/0xe0\nceph_con_v1_try_read+0x614/0x760\nceph_con_workfn+0x2de/0x650\nprocess_one_work+0x486/0x7c0\nprocess_scheduled_works+0x73/0x90\nworker_thread+0x1c8/0x2a0\nkthread+0x2ec/0x300\nret_from_fork+0x24/0x40\nret_from_fork_asm+0x1a/0x30\nRewrite the wait loop to check the above condition directly with\nclient->monc.mutex and client->osdc.lock taken as appropriate.  While\nat it, improve the timeout handling (previously mount_timeout could be\nexceeded in case wait_event_interruptible_timeout() slept more than\nonce) and access client->auth_err under client->monc.mutex to match\nhow it's set in finish_auth().\nmonmap_show() and osdmap_show() now take the respective lock before\naccessing the map as well.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-68285"
        }
      ],
      "release_date": "2025-12-16T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39933",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nsmb: client: let recv_done verify data_offset, data_length and remaining_data_length\nThis is inspired by the related server fixes.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39933"
        }
      ],
      "release_date": "2025-10-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40096",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndrm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies\nWhen adding dependencies with drm_sched_job_add_dependency(), that\nfunction consumes the fence reference both on success and failure, so in\nthe latter case the dma_fence_put() on the error path (xarray failed to\nexpand) is a double free.\nInterestingly this bug appears to have been present ever since\ncommit ebd5f74255b9 (\"drm/sched: Add dependency tracking\"), since the code\nback then looked like this:\ndrm_sched_job_add_implicit_dependencies():\n...\nfor (i = 0; i < fence_count; i++) {\nret = drm_sched_job_add_dependency(job, fences[i]);\nif (ret)\nbreak;\n}\nfor (; i < fence_count; i++)\ndma_fence_put(fences[i]);\nWhich means for the failing 'i' the dma_fence_put was already a double\nfree. Possibly there were no users at that time, or the test cases were\ninsufficient to hit it.\nThe bug was then only noticed and fixed after\ncommit 9c2ba265352a (\"drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2\")\nlanded, with its fixup of\ncommit 4eaf02d6076c (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies\").\nAt that point it was a slightly different flavour of a double free, which\ncommit 963d0b356935 (\"drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder\")\nnoticed and attempted to fix.\nBut it only moved the double free from happening inside the\ndrm_sched_job_add_dependency(), when releasing the reference not yet\nobtained, to the caller, when releasing the reference already released by\nthe former in the failure case.\nAs such it is not easy to identify the right target for the fixes tag so\nlets keep it simple and just continue the chain.\nWhile fixing we also improve the comment and explain the reason for taking\nthe reference and not dropping it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40096"
        }
      ],
      "release_date": "2025-10-30T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-68301",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet: atlantic: fix fragment overflow handling in RX path\nThe atlantic driver can receive packets with more than MAX_SKB_FRAGS (17)\nfragments when handling large multi-descriptor packets. This causes an\nout-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic.\nThe issue occurs because the driver doesn't check the total number of\nfragments before calling skb_add_rx_frag(). When a packet requires more\nthan MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds.\nFix by assuming there will be an extra frag if buff->len > AQ_CFG_RX_HDR_SIZE,\nthen all fragments are accounted for. And reusing the existing check to\nprevent the overflow earlier in the code path.\nThis crash occurred in production with an Aquantia AQC113 10G NIC.\nStack trace from production environment:\n```\nRIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0\nCode: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89\nca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90\nc8 00 00 00 <48> 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48\n89 fa 83\nRSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287\nRAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX:\nfffffffe0a0c8000\nRDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI:\n0000000000037a40\nRBP: 0000000000000024 R08: 0000000000000000 R09:\n0000000000000021\nR10: 0000000000000848 R11: 0000000000000000 R12:\nffffa9bec02a8e24\nR13: ffff925ad8615570 R14: 0000000000000000 R15:\nffff925b22e80a00\nFS: 0000000000000000(0000)\nGS:ffff925e47880000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4:\n0000000000f72ef0\nPKRU: 55555554\nCall Trace:\n<IRQ>\naq_ring_rx_clean+0x175/0xe60 [atlantic]\n? aq_ring_rx_clean+0x14d/0xe60 [atlantic]\n? aq_ring_tx_clean+0xdf/0x190 [atlantic]\n? kmem_cache_free+0x348/0x450\n? aq_vec_poll+0x81/0x1d0 [atlantic]\n? __napi_poll+0x28/0x1c0\n? net_rx_action+0x337/0x420\n```\nChanges in v4:\n- Add Fixes: tag to satisfy patch validation requirements.\nChanges in v3:\n- Fix by assuming there will be an extra frag if buff->len > AQ_CFG_RX_HDR_SIZE,\nthen all fragments are accounted for.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-68301"
        }
      ],
      "release_date": "2025-12-16T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40277",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndrm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE\nThis data originates from userspace and is used in buffer offset\ncalculations which could potentially overflow causing an out-of-bounds\naccess.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40277"
        }
      ],
      "release_date": "2025-12-06T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40248",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nvsock: Ignore signal/timeout on connect() if already established\nDuring connect(), acting on a signal/timeout by disconnecting an already\nestablished socket leads to several issues:\n1. connect() invoking vsock_transport_cancel_pkt() ->\nvirtio_transport_purge_skbs() may race with sendmsg() invoking\nvirtio_transport_get_credit(). This results in a permanently elevated\n`vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.\n2. connect() resetting a connected socket's state may race with socket\nbeing placed in a sockmap. A disconnected socket remaining in a sockmap\nbreaks sockmap's assumptions. And gives rise to WARNs.\n3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a\ntransport change/drop after TCP_ESTABLISHED. Which poses a problem for\nany simultaneous sendmsg() or connect() and may result in a\nuse-after-free/null-ptr-deref.\nDo not disconnect socket on signal/timeout. Keep the logic for unconnected\nsockets: they don't linger, can't be placed in a sockmap, are rejected by\nsendmsg().\n[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/\n[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/\n[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40248"
        }
      ],
      "release_date": "2025-12-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53386",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix potential use-after-free when clear keys\n\nSimilar to commit c5d2b6fa26b5 (\"Bluetooth: Fix use-after-free in\nhci_remove_ltk/hci_remove_irk\"). We can not access k after kfree_rcu()\ncall.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53386"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/35cc42f04bc49f0656f6840cb7451b3df6049649",
          "url": "https://git.kernel.org/stable/c/35cc42f04bc49f0656f6840cb7451b3df6049649"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3673952cf0c6cf81b06c66a0b788abeeb02ff3ae",
          "url": "https://git.kernel.org/stable/c/3673952cf0c6cf81b06c66a0b788abeeb02ff3ae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/942d8cefb022f384d5424f8b90c7878f3f93726f",
          "url": "https://git.kernel.org/stable/c/942d8cefb022f384d5424f8b90c7878f3f93726f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94617b736c25091b60e514e2e7aeafcbbee6b700",
          "url": "https://git.kernel.org/stable/c/94617b736c25091b60e514e2e7aeafcbbee6b700"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da19f35868dfbecfff4f81166c054d2656cb1be4",
          "url": "https://git.kernel.org/stable/c/da19f35868dfbecfff4f81166c054d2656cb1be4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd",
          "url": "https://git.kernel.org/stable/c/e87da6a0ac6e631454e7da53a76aa9fe44aaa5dd"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38529",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: aio_iiro_16: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & 0xdcfc) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
          "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38529"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53",
          "url": "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ac7c60439236fb691b8c7987390e2327bbf18fa",
          "url": "https://git.kernel.org/stable/c/5ac7c60439236fb691b8c7987390e2327bbf18fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4",
          "url": "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c",
          "url": "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a88692245c315bf8e225f205297a6f4b13d6856a",
          "url": "https://git.kernel.org/stable/c/a88692245c315bf8e225f205297a6f4b13d6856a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c593215385f0c0163015cca4512ed3ff42875d19",
          "url": "https://git.kernel.org/stable/c/c593215385f0c0163015cca4512ed3ff42875d19"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba",
          "url": "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7",
          "url": "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-02T11:33:54.708875Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032",
          "product_ids": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1770032032"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-Stream-8:bpftool-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-cross-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-core-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-debug-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-headers-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-ipaclones-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-extra-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-modules-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-selftests-internal-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:kernel-tools-libs-devel-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64",
            "CentOS-Stream-8:python3-perf-0:4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}