{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}\n- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}\n- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}\n- wifi: mac80211_hwsim: drop short frames {CVE-2023-53321}\n- wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}\n- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422}\n- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}\n- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945}\n- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}\n- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}\n- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322}\n- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}\n- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}\n- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}\n- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}\n- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}\n- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}\n- spec: merge oraclelinux6els changes\n- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}\n- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}\n- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}\n- ipvs: use explicitly signed chars\n- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}\n- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}\n- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}\n- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}\n- mtd: inftlcore: Add error check for inftl_read_oob() {CVE-2025-37892}\n- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}\n- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}\n- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}\n- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}\n- md-raid10: fix KASAN warning {CVE-2022-50211}\n- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}\n- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}\n- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}\n- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014}\n- isofs: Prevent the use of too small fid {CVE-2025-37780}\n- net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789}\n- partitions: mac: fix handling of bogus partition table {CVE-2025-21772}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos6els/advisories/2026/clsa-2026_1768669128.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
      }
    ],
    "tracking": {
      "current_release_date": "2026-01-28T10:47:32Z",
      "generator": {
        "date": "2026-01-28T10:47:32Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1768669128",
      "initial_release_date": "2026-01-17T16:58:50Z",
      "revision_history": [
        {
          "date": "2026-01-17T16:58:50Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-01-28T10:47:32Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "kernel: Fix of 39 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 6",
                "product": {
                  "name": "Community Enterprise Operating System 6",
                  "product_id": "CentOS-6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                "product": {
                  "name": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_id": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel@2.6.32-754.35.8.el6.tuxcare.els28?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_id": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug@2.6.32-754.35.8.el6.tuxcare.els28?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_id": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-devel@2.6.32-754.35.8.el6.tuxcare.els28?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-devel@2.6.32-754.35.8.el6.tuxcare.els28?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                "product": {
                  "name": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_id": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/python-perf@2.6.32-754.35.8.el6.tuxcare.els28?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                "product": {
                  "name": "perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_id": "perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/perf@2.6.32-754.35.8.el6.tuxcare.els28?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_id": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-headers@2.6.32-754.35.8.el6.tuxcare.els28?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                  "product_id": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-abi-whitelists@2.6.32-754.35.8.el6.tuxcare.els28?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                "product": {
                  "name": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                  "product_id": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-firmware@2.6.32-754.35.8.el6.tuxcare.els28?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                  "product_id": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-doc@2.6.32-754.35.8.el6.tuxcare.els28?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-devel@2.6.32-754.35.8.el6.tuxcare.els28?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
        "relates_to_product_reference": "CentOS-6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-23042",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-23042"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
          "url": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
        }
      ],
      "release_date": "2022-03-10T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37789",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix nested key length validation in the set() action\n\nIt's not safe to access nla_len(ovs_key) if the data is smaller than\nthe netlink header.  Check that the attribute is OK first.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37789"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b",
          "url": "https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec",
          "url": "https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce",
          "url": "https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba",
          "url": "https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd",
          "url": "https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7",
          "url": "https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4",
          "url": "https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc",
          "url": "https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49918",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix WARNING in __ip_vs_cleanup_batch()\n\nDuring the initialization of ip_vs_conn_net_init(), if file ip_vs_conn\nor ip_vs_conn_sync fails to be created, the initialization is successful\nby default. Therefore, the ip_vs_conn or ip_vs_conn_sync file doesn't\nbe found during the remove.\n\nThe following is the stack information:\nname 'ip_vs_conn_sync'\nWARNING: CPU: 3 PID: 9 at fs/proc/generic.c:712\nremove_proc_entry+0x389/0x460\nModules linked in:\nWorkqueue: netns cleanup_net\nRIP: 0010:remove_proc_entry+0x389/0x460\nCall Trace:\n<TASK>\n__ip_vs_cleanup_batch+0x7d/0x120\nops_exit_list+0x125/0x170\ncleanup_net+0x4ea/0xb00\nprocess_one_work+0x9bf/0x1710\nworker_thread+0x665/0x1080\nkthread+0x2e4/0x3a0\nret_from_fork+0x1f/0x30\n</TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49918"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d00c6a0da8ddcf75213e004765e4a42acc71d5d",
          "url": "https://git.kernel.org/stable/c/3d00c6a0da8ddcf75213e004765e4a42acc71d5d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ee2d6b726b0ce339e36569e5849692f4cf4595e",
          "url": "https://git.kernel.org/stable/c/5ee2d6b726b0ce339e36569e5849692f4cf4595e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7effc4ce3d1434ce6ff286866585a6e905fdbfc1",
          "url": "https://git.kernel.org/stable/c/7effc4ce3d1434ce6ff286866585a6e905fdbfc1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/931f56d59c854263b32075bfac56fdb3b1598d1b",
          "url": "https://git.kernel.org/stable/c/931f56d59c854263b32075bfac56fdb3b1598d1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e724220b826e008764309d2a1f55a9434a4e1530",
          "url": "https://git.kernel.org/stable/c/e724220b826e008764309d2a1f55a9434a4e1530"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f08ee2aa24c076f81d84e26e213d8c6f4efd9f50",
          "url": "https://git.kernel.org/stable/c/f08ee2aa24c076f81d84e26e213d8c6f4efd9f50"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-49917",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix WARNING in ip_vs_app_net_cleanup()\n\nDuring the initialization of ip_vs_app_net_init(), if file ip_vs_app\nfails to be created, the initialization is successful by default.\nTherefore, the ip_vs_app file doesn't be found during the remove in\nip_vs_app_net_cleanup(). It will cause WRNING.\n\nThe following is the stack information:\nname 'ip_vs_app'\nWARNING: CPU: 1 PID: 9 at fs/proc/generic.c:712 remove_proc_entry+0x389/0x460\nModules linked in:\nWorkqueue: netns cleanup_net\nRIP: 0010:remove_proc_entry+0x389/0x460\nCall Trace:\n<TASK>\nops_exit_list+0x125/0x170\ncleanup_net+0x4ea/0xb00\nprocess_one_work+0x9bf/0x1710\nworker_thread+0x665/0x1080\nkthread+0x2e4/0x3a0\nret_from_fork+0x1f/0x30\n</TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49917"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/06d7596d18725f1a93cf817662d36050e5afb989",
          "url": "https://git.kernel.org/stable/c/06d7596d18725f1a93cf817662d36050e5afb989"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2c8d81bdb2684d53d6cedad7410ba4cf9090e343",
          "url": "https://git.kernel.org/stable/c/2c8d81bdb2684d53d6cedad7410ba4cf9090e343"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5663ed63adb9619c98ab7479aa4606fa9b7a548c",
          "url": "https://git.kernel.org/stable/c/5663ed63adb9619c98ab7479aa4606fa9b7a548c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8457a00c981fe1a799ce34123908856b0f5973b8",
          "url": "https://git.kernel.org/stable/c/8457a00c981fe1a799ce34123908856b0f5973b8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97f872b00937f2689bff2dab4ad9ed259482840f",
          "url": "https://git.kernel.org/stable/c/97f872b00937f2689bff2dab4ad9ed259482840f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adc76740ccd52e4a1d910767cd1223e134a7078b",
          "url": "https://git.kernel.org/stable/c/adc76740ccd52e4a1d910767cd1223e134a7078b"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53000",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n    u16 type = nla_type(nla);\n\n    if (type == 0 || type > maxtype) {\n        /* error or continue */\n    }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff",
          "url": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45",
          "url": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d",
          "url": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184",
          "url": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455",
          "url": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455"
        }
      ],
      "release_date": "2025-03-27T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50367",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: fix UAF/GPF bug in nilfs_mdt_destroy\n\nIn alloc_inode, inode_init_always() could return -ENOMEM if\nsecurity_inode_alloc() fails, which causes inode->i_private\nuninitialized. Then nilfs_is_metadata_file_inode() returns\ntrue and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),\nwhich frees the uninitialized inode->i_private\nand leads to crashes(e.g., UAF/GPF).\n\nFix this by moving security_inode_alloc just prior to\nthis_cpu_inc(nr_inodes)",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50367"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8",
          "url": "https://git.kernel.org/stable/c/1e555c3ed1fce4b278aaebe18a64a934cece57d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9",
          "url": "https://git.kernel.org/stable/c/2a96b532098284ecf8e4849b8b9e5fc7a28bdee9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29",
          "url": "https://git.kernel.org/stable/c/2e488f13755ffbb60f307e991b27024716a33b29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115",
          "url": "https://git.kernel.org/stable/c/64b79e632869ad3ef6c098a4731d559381da1115"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4",
          "url": "https://git.kernel.org/stable/c/70e4f70d54e0225f91814e8610477d65f33cefe4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452",
          "url": "https://git.kernel.org/stable/c/81de80330fa6907aec32eb54c5619059e6e36452"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4",
          "url": "https://git.kernel.org/stable/c/c0aa76b0f17f59dd9c9d3463550a2986a1d592e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad",
          "url": "https://git.kernel.org/stable/c/d1ff475d7c83289d0a7faef346ea3bbf90818bad"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48",
          "url": "https://git.kernel.org/stable/c/ec2aab115eb38ac4992ea2fcc2a02fbe7af5cf48"
        }
      ],
      "release_date": "2025-09-17T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53153",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Fix use after free for wext\n\nKey information in wext.connect is not reset on (re)connect and can hold\ndata from a previous connection.\n\nReset key data to avoid that drivers or mac80211 incorrectly detect a\nWEP connection request and access the freed or already reused memory.\n\nAdditionally optimize cfg80211_sme_connect() and avoid an useless\nschedule of conn_work.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b",
          "url": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747",
          "url": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7",
          "url": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9",
          "url": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2",
          "url": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6",
          "url": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7",
          "url": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4",
          "url": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-21772",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n   preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n   (which results in partition table entries straddling sector boundaries),\n   bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n   termination - use strnlen() and strncmp() instead of strlen() and\n   strcmp().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/213ba5bd81b7e97ac6e6190b8f3bc6ba76123625",
          "url": "https://git.kernel.org/stable/c/213ba5bd81b7e97ac6e6190b8f3bc6ba76123625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27a39d006f85e869be68c1d5d2ce05e5d6445bf5",
          "url": "https://git.kernel.org/stable/c/27a39d006f85e869be68c1d5d2ce05e5d6445bf5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40a35d14f3c0dc72b689061ec72fc9b193f37d1f",
          "url": "https://git.kernel.org/stable/c/40a35d14f3c0dc72b689061ec72fc9b193f37d1f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6578717ebca91678131d2b1f4ba4258e60536e9f",
          "url": "https://git.kernel.org/stable/c/6578717ebca91678131d2b1f4ba4258e60536e9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fa9706722882f634090bfc9af642bf9ed719e27",
          "url": "https://git.kernel.org/stable/c/7fa9706722882f634090bfc9af642bf9ed719e27"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/80e648042e512d5a767da251d44132553fe04ae0",
          "url": "https://git.kernel.org/stable/c/80e648042e512d5a767da251d44132553fe04ae0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/92527100be38ede924768f4277450dfe8a40e16b",
          "url": "https://git.kernel.org/stable/c/92527100be38ede924768f4277450dfe8a40e16b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3e77da9f843e4ab93917d30c314f0283e28c124",
          "url": "https://git.kernel.org/stable/c/a3e77da9f843e4ab93917d30c314f0283e28c124"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-02-27T03:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37882",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix isochronous Ring Underrun/Overrun event handling\n\nThe TRB pointer of these events points at enqueue at the time of error\noccurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we\nare handling the event, a new TD may be queued at this ring position.\n\nI can trigger this race by rising interrupt moderation to increase IRQ\nhandling delay. Similar delay may occur naturally due to system load.\n\nIf this ever happens after a Missed Service Error, missed TDs will be\nskipped and the new TD processed as if it matched the event. It could\nbe given back prematurely, risking data loss or buffer UAF by the xHC.\n\nDon't complete TDs on xrun events and don't warn if queued TDs don't\nmatch the event's TRB pointer, which can be NULL or a link/no-op TRB.\nDon't warn if there are no queued TDs at all.\n\nNow that it's safe, also handle xrun events if the skip flag is clear.\nThis ensures completion of any TD stuck in 'error mid TD' state right\nbefore the xrun event, which could happen if a driver submits a finite\nnumber of URBs to a buggy HC and then an error occurs on the last TD.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37882"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915",
          "url": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454",
          "url": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4",
          "url": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38556",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Harden s32ton() against conversion to 0 bits\n\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity.  Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\n\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38556"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a",
          "url": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7",
          "url": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
          "url": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
          "url": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
          "url": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2",
          "url": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53365",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6mr: Fix skb_under_panic in ip6mr_cache_report()\n\nskbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4\n head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg\n ------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:192!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: ipv6_addrconf addrconf_dad_work\n RIP: 0010:skb_panic+0x152/0x1d0\n Call Trace:\n  <TASK>\n  skb_push+0xc4/0xe0\n  ip6mr_cache_report+0xd69/0x19b0\n  reg_vif_xmit+0x406/0x690\n  dev_hard_start_xmit+0x17e/0x6e0\n  __dev_queue_xmit+0x2d6a/0x3d20\n  vlan_dev_hard_start_xmit+0x3ab/0x5c0\n  dev_hard_start_xmit+0x17e/0x6e0\n  __dev_queue_xmit+0x2d6a/0x3d20\n  neigh_connected_output+0x3ed/0x570\n  ip6_finish_output2+0x5b5/0x1950\n  ip6_finish_output+0x693/0x11c0\n  ip6_output+0x24b/0x880\n  NF_HOOK.constprop.0+0xfd/0x530\n  ndisc_send_skb+0x9db/0x1400\n  ndisc_send_rs+0x12a/0x6c0\n  addrconf_dad_completed+0x3c9/0xea0\n  addrconf_dad_work+0x849/0x1420\n  process_one_work+0xa22/0x16e0\n  worker_thread+0x679/0x10c0\n  ret_from_fork+0x28/0x60\n  ret_from_fork_asm+0x11/0x20\n\nWhen setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().\nreg_vif_xmit()\n    ip6mr_cache_report()\n        skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4\nAnd skb_push declared as:\n\tvoid *skb_push(struct sk_buff *skb, unsigned int len);\n\t\tskb->data -= len;\n\t\t//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850\nskb->data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53365"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0",
          "url": "https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346",
          "url": "https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4",
          "url": "https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c",
          "url": "https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560",
          "url": "https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb",
          "url": "https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd",
          "url": "https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d",
          "url": "https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d"
        }
      ],
      "release_date": "2025-09-17T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-58014",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()\n\nIn 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN()\ninstead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access.\nCompile tested only.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-58014"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/093286c33409bf38896f2dab0c0bb6ca388afb33",
          "url": "https://git.kernel.org/stable/c/093286c33409bf38896f2dab0c0bb6ca388afb33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a457223cb2b9ca46bae7de387d0f4c093b0220d",
          "url": "https://git.kernel.org/stable/c/0a457223cb2b9ca46bae7de387d0f4c093b0220d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13ef16c4fe384b1e70277bbe1d87934ee6c81e12",
          "url": "https://git.kernel.org/stable/c/13ef16c4fe384b1e70277bbe1d87934ee6c81e12"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f4a0948c3524ae50f166dbc6572a3296b014e62",
          "url": "https://git.kernel.org/stable/c/3f4a0948c3524ae50f166dbc6572a3296b014e62"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f6e293246dc1f5b2b6b3d0f2d757598489cda79",
          "url": "https://git.kernel.org/stable/c/6f6e293246dc1f5b2b6b3d0f2d757598489cda79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ada9df08b3ef683507e75b92f522fb659260147f",
          "url": "https://git.kernel.org/stable/c/ada9df08b3ef683507e75b92f522fb659260147f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c27ce584d274f6ad3cba2294497de824a3c66646",
          "url": "https://git.kernel.org/stable/c/c27ce584d274f6ad3cba2294497de824a3c66646"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d280a12e9b87819a8a209639d600b48a2d6d65dc",
          "url": "https://git.kernel.org/stable/c/d280a12e9b87819a8a209639d600b48a2d6d65dc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-02-27T03:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53322",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Wait for io return on terminate rport\n\nSystem crash due to use after free.\nCurrent code allows terminate_rport_io to exit before making\nsure all IOs has returned. For FCP-2 device, IO's can hang\non in HW because driver has not tear down the session in FW at\nfirst sign of cable pull. When dev_loss_tmo timer pops,\nterminate_rport_io is called and upper layer is about to\nfree various resources. Terminate_rport_io trigger qla to do\nthe final cleanup, but the cleanup might not be fast enough where it\nleave qla still holding on to the same resource.\n\nWait for IO's to return to upper layer before resources are freed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53322"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/079c8264ed9fea8cbcac01ad29040f901cbc3692",
          "url": "https://git.kernel.org/stable/c/079c8264ed9fea8cbcac01ad29040f901cbc3692"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4647d2e88918a078359d1532d90c417a38542c9e",
          "url": "https://git.kernel.org/stable/c/4647d2e88918a078359d1532d90c417a38542c9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bcdaafd92be6035ddc77fa76650cf9dd5b864c4",
          "url": "https://git.kernel.org/stable/c/5bcdaafd92be6035ddc77fa76650cf9dd5b864c4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a55556cd7e0220486163b1285ce11a8be2ce5fa",
          "url": "https://git.kernel.org/stable/c/8a55556cd7e0220486163b1285ce11a8be2ce5fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90770dad1eb30967ebd8d37d82830bcf270b3293",
          "url": "https://git.kernel.org/stable/c/90770dad1eb30967ebd8d37d82830bcf270b3293"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a9fe97fb7b4ee21bffb76f2acb05769bad27ae70",
          "url": "https://git.kernel.org/stable/c/a9fe97fb7b4ee21bffb76f2acb05769bad27ae70"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d25fded78d88e1515439b3ba581684d683e0b6ab",
          "url": "https://git.kernel.org/stable/c/d25fded78d88e1515439b3ba581684d683e0b6ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc0cba0c7be8261a1625098bd1d695077ec621c9",
          "url": "https://git.kernel.org/stable/c/fc0cba0c7be8261a1625098bd1d695077ec621c9"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39751",
      "notes": [
        {
          "category": "description",
          "text": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "Vulnerability description"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39751"
        }
      ],
      "release_date": "2025-09-11T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-2978",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-2978"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-fsdevel/20220816040859.659129-1-dzm91%40hust.edu.cn/T/#u",
          "url": "https://lore.kernel.org/linux-fsdevel/20220816040859.659129-1-dzm91%40hust.edu.cn/T/#u"
        }
      ],
      "release_date": "2022-08-24T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53321",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211_hwsim: drop short frames\n\nWhile technically some control frames like ACK are shorter and\nend after Address 1, such frames shouldn't be forwarded through\nwmediumd or similar userspace, so require the full 3-address\nheader to avoid accessing invalid memory if shorter frames are\npassed in.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53321"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3beb97bed860d95b14ad23578ce8ddaea62023db",
          "url": "https://git.kernel.org/stable/c/3beb97bed860d95b14ad23578ce8ddaea62023db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/672205c6f2d11978fcd7f0f336bb2c708e28874b",
          "url": "https://git.kernel.org/stable/c/672205c6f2d11978fcd7f0f336bb2c708e28874b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89a41ed7f21476301659ebd25ccb48a60791c1a7",
          "url": "https://git.kernel.org/stable/c/89a41ed7f21476301659ebd25ccb48a60791c1a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b9a175e3b250b0dc6e152988040aa5014e98e61e",
          "url": "https://git.kernel.org/stable/c/b9a175e3b250b0dc6e152988040aa5014e98e61e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c64ee9dd335832d5e2ab0a8fc83a34ad4c729799",
          "url": "https://git.kernel.org/stable/c/c64ee9dd335832d5e2ab0a8fc83a34ad4c729799"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fba360a047d5eeeb9d4b7c3a9b1c8308980ce9a6",
          "url": "https://git.kernel.org/stable/c/fba360a047d5eeeb9d4b7c3a9b1c8308980ce9a6"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50258",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()\n\nThis patch fixes a stack-out-of-bounds read in brcmfmac that occurs\nwhen 'buf' that is not null-terminated is passed as an argument of\nstrsep() in brcmf_c_preinit_dcmds(). This buffer is filled with a firmware\nversion string by memcpy() in brcmf_fil_iovar_data_get().\nThe patch ensures buf is null-terminated.\n\nFound by a modified version of syzkaller.\n\n[   47.569679][ T1897] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43236b for chip BCM43236/3\n[   47.582839][ T1897] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available\n[   47.601565][ T1897] ==================================================================\n[   47.602574][ T1897] BUG: KASAN: stack-out-of-bounds in strsep+0x1b2/0x1f0\n[   47.603447][ T1897] Read of size 1 at addr ffffc90001f6f000 by task kworker/0:2/1897\n[   47.604336][ T1897]\n[   47.604621][ T1897] CPU: 0 PID: 1897 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #131\n[   47.605617][ T1897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\n[   47.606907][ T1897] Workqueue: usb_hub_wq hub_event\n[   47.607453][ T1897] Call Trace:\n[   47.607801][ T1897]  dump_stack_lvl+0x8e/0xd1\n[   47.608295][ T1897]  print_address_description.constprop.0.cold+0xf/0x334\n[   47.609009][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609434][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609863][ T1897]  kasan_report.cold+0x83/0xdf\n[   47.610366][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.610882][ T1897]  strsep+0x1b2/0x1f0\n[   47.611300][ T1897]  ? brcmf_fil_iovar_data_get+0x3a/0xf0\n[   47.611883][ T1897]  brcmf_c_preinit_dcmds+0x995/0xc40\n[   47.612434][ T1897]  ? brcmf_c_set_joinpref_default+0x100/0x100\n[   47.613078][ T1897]  ? rcu_read_lock_sched_held+0xa1/0xd0\n[   47.613662][ T1897]  ? rcu_read_lock_bh_held+0xb0/0xb0\n[   47.614208][ T1897]  ? lock_acquire+0x19d/0x4e0\n[   47.614704][ T1897]  ? find_held_lock+0x2d/0x110\n[   47.615236][ T1897]  ? brcmf_usb_deq+0x1a7/0x260\n[   47.615741][ T1897]  ? brcmf_usb_rx_fill_all+0x5a/0xf0\n[   47.616288][ T1897]  brcmf_attach+0x246/0xd40\n[   47.616758][ T1897]  ? wiphy_new_nm+0x1703/0x1dd0\n[   47.617280][ T1897]  ? kmemdup+0x43/0x50\n[   47.617720][ T1897]  brcmf_usb_probe+0x12de/0x1690\n[   47.618244][ T1897]  ? brcmf_usbdev_qinit.constprop.0+0x470/0x470\n[   47.618901][ T1897]  usb_probe_interface+0x2aa/0x760\n[   47.619429][ T1897]  ? usb_probe_device+0x250/0x250\n[   47.619950][ T1897]  really_probe+0x205/0xb70\n[   47.620435][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.621048][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.621595][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.622209][ T1897]  driver_probe_device+0x4e/0x150\n[   47.622739][ T1897]  __device_attach_driver+0x1cc/0x2a0\n[   47.623287][ T1897]  bus_for_each_drv+0x156/0x1d0\n[   47.623796][ T1897]  ? bus_rescan_devices+0x30/0x30\n[   47.624309][ T1897]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n[   47.624907][ T1897]  ? trace_hardirqs_on+0x46/0x160\n[   47.625437][ T1897]  __device_attach+0x23f/0x3a0\n[   47.625924][ T1897]  ? device_bind_driver+0xd0/0xd0\n[   47.626433][ T1897]  ? kobject_uevent_env+0x287/0x14b0\n[   47.627057][ T1897]  bus_probe_device+0x1da/0x290\n[   47.627557][ T1897]  device_add+0xb7b/0x1eb0\n[   47.628027][ T1897]  ? wait_for_completion+0x290/0x290\n[   47.628593][ T1897]  ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0\n[   47.629249][ T1897]  usb_set_configuration+0xf59/0x16f0\n[   47.629829][ T1897]  usb_generic_driver_probe+0x82/0xa0\n[   47.630385][ T1897]  usb_probe_device+0xbb/0x250\n[   47.630927][ T1897]  ? usb_suspend+0x590/0x590\n[   47.631397][ T1897]  really_probe+0x205/0xb70\n[   47.631855][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.632469][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.633002][ \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50258"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69",
          "url": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0",
          "url": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c",
          "url": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c",
          "url": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f",
          "url": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7",
          "url": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0",
          "url": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4",
          "url": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50211",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd-raid10: fix KASAN warning\n\nThere's a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\n\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\n\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x34/0x44\n print_report.cold+0x45/0x57a\n ? __lock_text_start+0x18/0x18\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n kasan_report+0xa8/0xe0\n ? raid10_remove_disk+0x61/0x2a0 [raid10]\n raid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\n remove_and_add_spares+0x367/0x8a0 [md_mod]\n ? super_written+0x1c0/0x1c0 [md_mod]\n ? mutex_trylock+0xac/0x120\n ? _raw_spin_lock+0x72/0xc0\n ? _raw_spin_lock_bh+0xc0/0xc0\n md_check_recovery+0x848/0x960 [md_mod]\n raid10d+0xcf/0x3360 [raid10]\n ? sched_clock_cpu+0x185/0x1a0\n ? rb_erase+0x4d4/0x620\n ? var_wake_function+0xe0/0xe0\n ? psi_group_change+0x411/0x500\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? raid10_sync_request+0x36c0/0x36c0 [raid10]\n ? preempt_count_sub+0xf/0xc0\n ? _raw_spin_unlock_irqrestore+0x19/0x40\n ? del_timer_sync+0xa9/0x100\n ? try_to_del_timer_sync+0xc0/0xc0\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? __lock_text_start+0x18/0x18\n ? _raw_spin_unlock_irq+0x11/0x24\n ? __list_del_entry_valid+0x68/0xa0\n ? finish_wait+0xa3/0x100\n md_thread+0x161/0x260 [md_mod]\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n ? _raw_spin_lock_irqsave+0x78/0xc0\n ? prepare_to_wait_event+0x2c0/0x2c0\n ? unregister_md_personality+0xa0/0xa0 [md_mod]\n kthread+0x148/0x180\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x1f/0x30\n </TASK>\n\nAllocated by task 124495:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x80/0xa0\n setup_conf+0x140/0x5c0 [raid10]\n raid10_run+0x4cd/0x740 [raid10]\n md_run+0x6f9/0x1300 [md_mod]\n raid_ctr+0x2531/0x4ac0 [dm_raid]\n dm_table_add_target+0x2b0/0x620 [dm_mod]\n table_load+0x1c8/0x400 [dm_mod]\n ctl_ioctl+0x29e/0x560 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n __do_compat_sys_ioctl+0xfa/0x160\n do_syscall_64+0x90/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nLast potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\nL __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nSecond to last potentially related work creation:\n kasan_save_stack+0x1e/0x40\n __kasan_record_aux_stack+0x9e/0xc0\n kvfree_call_rcu+0x84/0x480\n timerfd_release+0x82/0x140\n __fput+0xfa/0x400\n task_work_run+0x80/0xc0\n exit_to_user_mode_prepare+0x155/0x160\n syscall_exit_to_user_mode+0x12/0x40\n do_syscall_64+0x42/0xc0\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThe buggy address belongs to the object at ffff889108f3d200\n which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n 256-byte region [ffff889108f3d200, ffff889108f3d300)\n\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff889108f3d280: 00 00\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50211"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f4d18cbea4a6e37a05fd8ee2887439f85211110",
          "url": "https://git.kernel.org/stable/c/0f4d18cbea4a6e37a05fd8ee2887439f85211110"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f57843565131bb782388f9d993f9ee8f453dee1",
          "url": "https://git.kernel.org/stable/c/5f57843565131bb782388f9d993f9ee8f453dee1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5fd4ffa2372a41361d2bdd27ea5730e4e673240c",
          "url": "https://git.kernel.org/stable/c/5fd4ffa2372a41361d2bdd27ea5730e4e673240c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/75fbd370a2cec9e92f48285bd90735ed0c837f52",
          "url": "https://git.kernel.org/stable/c/75fbd370a2cec9e92f48285bd90735ed0c837f52"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a6ccc8fa192fd357c2d5d4c6ce67c834a179e23",
          "url": "https://git.kernel.org/stable/c/7a6ccc8fa192fd357c2d5d4c6ce67c834a179e23"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bcbdc26a44aba488d2f7122f2d66801bccb74733",
          "url": "https://git.kernel.org/stable/c/bcbdc26a44aba488d2f7122f2d66801bccb74733"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bf30b9ba09b0ac2a10f04dce2b0835ec4d178aa6",
          "url": "https://git.kernel.org/stable/c/bf30b9ba09b0ac2a10f04dce2b0835ec4d178aa6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ce839b9331c11780470f3d727b6fe3c2794a4620",
          "url": "https://git.kernel.org/stable/c/ce839b9331c11780470f3d727b6fe3c2794a4620"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d17f744e883b2f8d13cca252d71cfe8ace346f7d",
          "url": "https://git.kernel.org/stable/c/d17f744e883b2f8d13cca252d71cfe8ace346f7d"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-21546",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix WRITE_SAME No Data Buffer crash\n\nIn newer version of the SBC specs, we have a NDOB bit that indicates there\nis no data buffer that gets written out. If this bit is set using commands\nlike \"sg_write_same --ndob\" we will crash in target_core_iblock/file's\nexecute_write_same handlers when we go to access the se_cmd->t_data_sg\nbecause its NULL.\n\nThis patch adds a check for the NDOB bit in the common WRITE SAME code\nbecause we don't support it. And, it adds a check for zero SG elements in\neach handler in case the initiator tries to send a normal WRITE SAME with\nno data buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-21546"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510",
          "url": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b",
          "url": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29",
          "url": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899",
          "url": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-02T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-43945",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-43945"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html",
          "url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20221215-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
        }
      ],
      "release_date": "2022-11-04T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38245",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().\n\nsyzbot reported a warning below during atm_dev_register(). [0]\n\nBefore creating a new device and procfs/sysfs for it, atm_dev_register()\nlooks up a duplicated device by __atm_dev_lookup().  These operations are\ndone under atm_dev_mutex.\n\nHowever, when removing a device in atm_dev_deregister(), it releases the\nmutex just after removing the device from the list that __atm_dev_lookup()\niterates over.\n\nSo, there will be a small race window where the device does not exist on\nthe device list but procfs/sysfs are still not removed, triggering the\nsplat.\n\nLet's hold the mutex until procfs/sysfs are removed in\natm_dev_deregister().\n\n[0]:\nproc_dir_entry 'atm/atmtcp:0' already registered\nWARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377\nModules linked in:\nCPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nRIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377\nCode: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 <0f> 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48\nRSP: 0018:ffffc9000466fa30 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248\nRDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001\nRBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140\nR13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444\nFS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n proc_create_data+0xbe/0x110 fs/proc/generic.c:585\n atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361\n atm_dev_register+0x46d/0x890 net/atm/resources.c:113\n atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369\n atmtcp_attach drivers/atm/atmtcp.c:403 [inline]\n atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x115/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f38b3b74459\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459\nRDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005\nRBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f\nR10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac\nR13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38245"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c",
          "url": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439",
          "url": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec",
          "url": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a",
          "url": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c",
          "url": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4",
          "url": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e",
          "url": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896",
          "url": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38157",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Abort software beacon handling if disabled\n\nA malicious USB device can send a WMI_SWBA_EVENTID event from an\nath9k_htc-managed device before beaconing has been enabled. This causes\na device-by-zero error in the driver, leading to either a crash or an\nout of bounds read.\n\nPrevent this by aborting the handling in ath9k_htc_swba() if beacons are\nnot enabled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc",
          "url": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0",
          "url": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e",
          "url": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46",
          "url": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605",
          "url": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c",
          "url": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54",
          "url": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a",
          "url": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50252",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Do not free q_vector unless new one was allocated\n\nAvoid potential use-after-free condition under memory pressure. If the\nkzalloc() fails, q_vector will be freed but left in the original\nadapter->q_vector[v_idx] array position.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50252"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633",
          "url": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801",
          "url": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8",
          "url": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff",
          "url": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c",
          "url": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803",
          "url": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3",
          "url": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a",
          "url": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075",
          "url": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49907",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: fix undefined behavior in bit shift for __mdiobus_register\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in drivers/net/phy/mdio_bus.c:586:27\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n __mdiobus_register+0x49d/0x4e0\n fixed_mdio_bus_init+0xd8/0x12d\n do_one_initcall+0x76/0x430\n kernel_init_freeable+0x3b3/0x422\n kernel_init+0x24/0x1e0\n ret_from_fork+0x1f/0x30\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49907"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7",
          "url": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a",
          "url": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2",
          "url": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d",
          "url": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0",
          "url": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e",
          "url": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d",
          "url": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973",
          "url": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37823",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don't have a reliable reproducer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e",
          "url": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc",
          "url": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e",
          "url": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf",
          "url": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290",
          "url": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09",
          "url": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c",
          "url": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a",
          "url": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38459",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: clip: Fix infinite recursive call of clip_push().\n\nsyzbot reported the splat below. [0]\n\nThis happens if we call ioctl(ATMARP_MKIP) more than once.\n\nDuring the first call, clip_mkip() sets clip_push() to vcc->push(),\nand the second call copies it to clip_vcc->old_push().\n\nLater, when the socket is close()d, vcc_destroy_socket() passes\nNULL skb to clip_push(), which calls clip_vcc->old_push(),\ntriggering the infinite recursion.\n\nLet's prevent the second ioctl(ATMARP_MKIP) by checking\nvcc->user_back, which is allocated by the first call as clip_vcc.\n\nNote also that we use lock_sock() to prevent racy calls.\n\n[0]:\nBUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)\nOops: stack guard page: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191\nCode: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <41> 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00\nRSP: 0018:ffffc9000d670000 EFLAGS: 00010246\nRAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000\nRBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e\nR10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300\nR13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578\nFS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0\nCall Trace:\n <TASK>\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n...\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n vcc_destroy_socket net/atm/common.c:183 [inline]\n vcc_release+0x157/0x460 net/atm/common.c:205\n __sock_release net/socket.c:647 [inline]\n sock_close+0xc0/0x240 net/socket.c:1391\n __fput+0x449/0xa70 fs/file_table.c:465\n task_work_run+0x1d1/0x260 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114\n exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]\n do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7ff31c98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f\nR10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c\nR13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090\n </TASK>\nModules linked in:",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38459"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e",
          "url": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352",
          "url": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f",
          "url": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31",
          "url": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8",
          "url": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45",
          "url": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88",
          "url": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2",
          "url": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53432",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: net: fix use after free in fwnet_finish_incoming_packet()\n\nThe netif_rx() function frees the skb so we can't dereference it to\nsave the skb->len.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53432"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ea70379e4f4efa95c9daa7f3f9bdd4d40aec927",
          "url": "https://git.kernel.org/stable/c/2ea70379e4f4efa95c9daa7f3f9bdd4d40aec927"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ff256751a2853e1ffaa36958ff933ccc98c6cb5",
          "url": "https://git.kernel.org/stable/c/3ff256751a2853e1ffaa36958ff933ccc98c6cb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9040adc38cf6bfbb77034d558ac2c52f70d840ac",
          "url": "https://git.kernel.org/stable/c/9040adc38cf6bfbb77034d558ac2c52f70d840ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9860921ab4521252dc39bb21b9c936bd09a00982",
          "url": "https://git.kernel.org/stable/c/9860921ab4521252dc39bb21b9c936bd09a00982"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48900",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved:\nxen/netfront: react properly to failing gnttab_end_foreign_access_ref()",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48900"
        }
      ],
      "release_date": "2024-08-22T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-50410",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Protect against send buffer overflow in NFSv2 READ\n\nSince before the git era, NFSD has conserved the number of pages\nheld by each nfsd thread by combining the RPC receive and send\nbuffers into a single array of pages. This works because there are\nno cases where an operation needs a large RPC Call message and a\nlarge RPC Reply at the same time.\n\nOnce an RPC Call has been received, svc_process() updates\nsvc_rqst::rq_res to describe the part of rq_pages that can be\nused for constructing the Reply. This means that the send buffer\n(rq_res) shrinks when the received RPC record containing the RPC\nCall is large.\n\nA client can force this shrinkage on TCP by sending a correctly-\nformed RPC Call header contained in an RPC record that is\nexcessively large. The full maximum payload size cannot be\nconstructed in that case.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50410"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905",
          "url": "https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2007867c5874134f2271eb276398208070049dd3",
          "url": "https://git.kernel.org/stable/c/2007867c5874134f2271eb276398208070049dd3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2be9331ca6061bc6ea32247266f45b8b21030244",
          "url": "https://git.kernel.org/stable/c/2be9331ca6061bc6ea32247266f45b8b21030244"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/401bc1f90874280a80b93f23be33a0e7e2d1f912",
          "url": "https://git.kernel.org/stable/c/401bc1f90874280a80b93f23be33a0e7e2d1f912"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea4c3eee0fd72fcedaa238556044825639cd3607",
          "url": "https://git.kernel.org/stable/c/ea4c3eee0fd72fcedaa238556044825639cd3607"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-1380",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1380"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html",
          "url": "http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html",
          "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u",
          "url": "https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230511-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20230511-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/03/14/1",
          "url": "https://www.openwall.com/lists/oss-security/2023/03/14/1"
        }
      ],
      "release_date": "2023-03-27T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-35886",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix infinite recursion in fib6_dump_done().\n\nsyzkaller reported infinite recursive calls of fib6_dump_done() during\nnetlink socket destruction.  [1]\n\nFrom the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then\nthe response was generated.  The following recvmmsg() resumed the dump\nfor IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due\nto the fault injection.  [0]\n\n  12:01:34 executing program 3:\n  r0 = socket$nl_route(0x10, 0x3, 0x0)\n  sendmsg$nl_route(r0, ... snip ...)\n  recvmmsg(r0, ... snip ...) (fail_nth: 8)\n\nHere, fib6_dump_done() was set to nlk_sk(sk)->cb.done, and the next call\nof inet6_dump_fib() set it to nlk_sk(sk)->cb.args[3].  syzkaller stopped\nreceiving the response halfway through, and finally netlink_sock_destruct()\ncalled nlk_sk(sk)->cb.done().\n\nfib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)->cb.done() if it\nis still not NULL.  fib6_dump_end() rewrites nlk_sk(sk)->cb.done() by\nnlk_sk(sk)->cb.args[3], but it has the same function, not NULL, calling\nitself recursively and hitting the stack guard page.\n\nTo avoid the issue, let's set the destructor after kzalloc().\n\n[0]:\nFAULT_INJECTION: forcing a failure.\nname failslab, interval 1, probability 0, space 0, times 0\nCPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl (lib/dump_stack.c:117)\n should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)\n should_failslab (mm/slub.c:3733)\n kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)\n inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)\n rtnl_dump_all (net/core/rtnetlink.c:4029)\n netlink_dump (net/netlink/af_netlink.c:2269)\n netlink_recvmsg (net/netlink/af_netlink.c:1988)\n ____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)\n ___sys_recvmsg (net/socket.c:2846)\n do_recvmmsg (net/socket.c:2943)\n __x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)\n\n[1]:\nBUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)\nstack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nWorkqueue: events netlink_sock_destruct_work\nRIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)\nCode: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd <53> 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff\nRSP: 0018:ffffc9000d980000 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3\nRDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358\nRBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000\nR13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68\nFS:  0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0\nPKRU: 55555554\nCall Trace:\n <#DF>\n </#DF>\n <TASK>\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n ...\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n netlink_sock_destruct (net/netlink/af_netlink.c:401)\n __sk_destruct (net/core/sock.c:2177 (discriminator 2))\n sk_destruct (net/core/sock.c:2224)\n __sk_free (net/core/sock.c:2235)\n sk_free (net/core/sock.c:2246)\n process_one_work (kernel/workqueue.c:3259)\n worker_thread (kernel/workqueue.c:3329 kernel/workqueue.\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-35886"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/167d4b47a9bdcb01541dfa29e9f3cbb8edd3dfd2",
          "url": "https://git.kernel.org/stable/c/167d4b47a9bdcb01541dfa29e9f3cbb8edd3dfd2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40a344b2ddc06c1a2caa7208a43911f39c662778",
          "url": "https://git.kernel.org/stable/c/40a344b2ddc06c1a2caa7208a43911f39c662778"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a7c465a5dcd657d59d25bf4815e19ac05c13061",
          "url": "https://git.kernel.org/stable/c/4a7c465a5dcd657d59d25bf4815e19ac05c13061"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9472d07cd095cbd3294ac54c42f304a38fbe9bfe",
          "url": "https://git.kernel.org/stable/c/9472d07cd095cbd3294ac54c42f304a38fbe9bfe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c5258196182c25b55c33167cd72fdd9bbf08985",
          "url": "https://git.kernel.org/stable/c/9c5258196182c25b55c33167cd72fdd9bbf08985"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d21d40605bca7bd5fc23ef03d4c1ca1f48bc2cae",
          "url": "https://git.kernel.org/stable/c/d21d40605bca7bd5fc23ef03d4c1ca1f48bc2cae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f2dd75e57285f49e34af1a5b6cd8945c08243776",
          "url": "https://git.kernel.org/stable/c/f2dd75e57285f49e34af1a5b6cd8945c08243776"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd307f2d91d40fa7bc55df3e2cd1253fabf8a2d6",
          "url": "https://git.kernel.org/stable/c/fd307f2d91d40fa7bc55df3e2cd1253fabf8a2d6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-05-19T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50422",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libsas: Fix use-after-free bug in smp_execute_task_sg()\n\nWhen executing SMP task failed, the smp_execute_task_sg() calls del_timer()\nto delete \"slow_task->timer\". However, if the timer handler\nsas_task_internal_timedout() is running, the del_timer() in\nsmp_execute_task_sg() will not stop it and a UAF will happen. The process\nis shown below:\n\n      (thread 1)               |        (thread 2)\nsmp_execute_task_sg()          | sas_task_internal_timedout()\n ...                           |\n del_timer()                   |\n ...                           |  ...\n sas_free_task(task)           |\n  kfree(task->slow_task) //FREE|\n                               |  task->slow_task->... //USE\n\nFix by calling del_timer_sync() in smp_execute_task_sg(), which makes sure\nthe timer handler have finished before the \"task->slow_task\" is\ndeallocated.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50422"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe",
          "url": "https://git.kernel.org/stable/c/117331a2a5227fb4369c2a1f321d3e3e2e2ef8fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2e12ce270f0d926085c1209cc90397e307deef97",
          "url": "https://git.kernel.org/stable/c/2e12ce270f0d926085c1209cc90397e307deef97"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/46ba53c30666717cb06c2b3c5d896301cd00d0c0",
          "url": "https://git.kernel.org/stable/c/46ba53c30666717cb06c2b3c5d896301cd00d0c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a9e5176ead6de64f572ad5c87a72825d9d3c82ae",
          "url": "https://git.kernel.org/stable/c/a9e5176ead6de64f572ad5c87a72825d9d3c82ae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e45a1516d2933703a4823d9db71e17c3abeba24f",
          "url": "https://git.kernel.org/stable/c/e45a1516d2933703a4823d9db71e17c3abeba24f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7a785177611ffc97d645fcbc196e6de6ad2421d",
          "url": "https://git.kernel.org/stable/c/f7a785177611ffc97d645fcbc196e6de6ad2421d"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38051",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x53/0x70\n  print_report+0xce/0x640\n  kasan_report+0xb8/0xf0\n  cifs_fill_dirent+0xb03/0xb60 [cifs]\n  cifs_readdir+0x12cb/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\n f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n  </TASK>\n\n Allocated by task 408:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  __kasan_slab_alloc+0x6e/0x70\n  kmem_cache_alloc_noprof+0x117/0x3d0\n  mempool_alloc_noprof+0xf2/0x2c0\n  cifs_buf_get+0x36/0x80 [cifs]\n  allocate_buffers+0x1d2/0x330 [cifs]\n  cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n  kthread+0x394/0x720\n  ret_from_fork+0x34/0x70\n  ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3b/0x60\n  __kasan_slab_free+0x37/0x50\n  kmem_cache_free+0x2b8/0x500\n  cifs_buf_release+0x3c/0x70 [cifs]\n  cifs_readdir+0x1c97/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents64+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n  which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n  freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                             ^\n  ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1                       Process 2\n-----------------------------------\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38051"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
          "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
          "url": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
          "url": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
          "url": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
          "url": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
          "url": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
          "url": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
          "url": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49870",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncapabilities: fix undefined behavior in bit shift for CAP_TO_MASK\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in security/commoncap.c:1252:2\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n cap_task_prctl+0x561/0x6f0\n security_task_prctl+0x5a/0xb0\n __x64_sys_prctl+0x61/0x8f0\n do_syscall_64+0x58/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49870"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/151dc8087b5609e53b069c068e3f3ee100efa586",
          "url": "https://git.kernel.org/stable/c/151dc8087b5609e53b069c068e3f3ee100efa586"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27bdb134c043ff32c459d98f16550d0ffa0b3c34",
          "url": "https://git.kernel.org/stable/c/27bdb134c043ff32c459d98f16550d0ffa0b3c34"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13",
          "url": "https://git.kernel.org/stable/c/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5661f111a1616ac105ec8cec81bff99b60f847ac",
          "url": "https://git.kernel.org/stable/c/5661f111a1616ac105ec8cec81bff99b60f847ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b79fa628e2ab789e629a83cd211ef9b4c1a593e",
          "url": "https://git.kernel.org/stable/c/5b79fa628e2ab789e629a83cd211ef9b4c1a593e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65b0bc7a0690861812ade523d19f82688ab819dc",
          "url": "https://git.kernel.org/stable/c/65b0bc7a0690861812ade523d19f82688ab819dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dbaab08c8677d598244d21afb7818e44e1c5d826",
          "url": "https://git.kernel.org/stable/c/dbaab08c8677d598244d21afb7818e44e1c5d826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fcbd2b336834bd24e1d9454ad5737856470c10d7",
          "url": "https://git.kernel.org/stable/c/fcbd2b336834bd24e1d9454ad5737856470c10d7"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38415",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check return result of sb_min_blocksize\n\nSyzkaller reports an \"UBSAN: shift-out-of-bounds in squashfs_bio_read\" bug.\n\nSyzkaller forks multiple processes which after mounting the Squashfs\nfilesystem, issues an ioctl(\"/dev/loop0\", LOOP_SET_BLOCK_SIZE, 0x8000). \nNow if this ioctl occurs at the same time another process is in the\nprocess of mounting a Squashfs filesystem on /dev/loop0, the failure\noccurs.  When this happens the following code in squashfs_fill_super()\nfails.\n\n----\nmsblk->devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);\nmsblk->devblksize_log2 = ffz(~msblk->devblksize);\n----\n\nsb_min_blocksize() returns 0, which means msblk->devblksize is set to 0.\n\nAs a result, ffz(~msblk->devblksize) returns 64, and msblk->devblksize_log2\nis set to 64.\n\nThis subsequently causes the\n\nUBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36\nshift exponent 64 is too large for 64-bit type 'u64' (aka\n'unsigned long long')\n\nThis commit adds a check for a 0 return by sb_min_blocksize().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38415"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425",
          "url": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282",
          "url": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b",
          "url": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
          "url": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68",
          "url": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25",
          "url": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84",
          "url": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497",
          "url": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50408",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()\n\n> ret = brcmf_proto_tx_queue_data(drvr, ifp->ifidx, skb);\n\nmay be schedule, and then complete before the line\n\n> ndev->stats.tx_bytes += skb->len;\n\n[   46.912801] ==================================================================\n[   46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328\n[   46.935991]\n[   46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G           O      5.4.199-[REDACTED] #1\n[   46.947255] Hardware name: [REDACTED]\n[   46.954568] Call trace:\n[   46.957037]  dump_backtrace+0x0/0x2b8\n[   46.960719]  show_stack+0x24/0x30\n[   46.964052]  dump_stack+0x128/0x194\n[   46.967557]  print_address_description.isra.0+0x64/0x380\n[   46.972877]  __kasan_report+0x1d4/0x240\n[   46.976723]  kasan_report+0xc/0x18\n[   46.980138]  __asan_report_load4_noabort+0x18/0x20\n[   46.985027]  brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.990613]  dev_hard_start_xmit+0x1bc/0xda0\n[   46.994894]  sch_direct_xmit+0x198/0xd08\n[   46.998827]  __qdisc_run+0x37c/0x1dc0\n[   47.002500]  __dev_queue_xmit+0x1528/0x21f8\n[   47.006692]  dev_queue_xmit+0x24/0x30\n[   47.010366]  neigh_resolve_output+0x37c/0x678\n[   47.014734]  ip_finish_output2+0x598/0x2458\n[   47.018927]  __ip_finish_output+0x300/0x730\n[   47.023118]  ip_output+0x2e0/0x430\n[   47.026530]  ip_local_out+0x90/0x140\n[   47.030117]  igmpv3_sendpack+0x14c/0x228\n[   47.034049]  igmpv3_send_cr+0x384/0x6b8\n[   47.037895]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.042262]  call_timer_fn+0x1cc/0xbe8\n[   47.046021]  __run_timers+0x4d8/0xb28\n[   47.049693]  run_timer_softirq+0x24/0x40\n[   47.053626]  __do_softirq+0x2c0/0x117c\n[   47.057387]  irq_exit+0x2dc/0x388\n[   47.060715]  __handle_domain_irq+0xb4/0x158\n[   47.064908]  gic_handle_irq+0x58/0xb0\n[   47.068581]  el0_irq_naked+0x50/0x5c\n[   47.072162]\n[   47.073665] Allocated by task 328:\n[   47.077083]  save_stack+0x24/0xb0\n[   47.080410]  __kasan_kmalloc.isra.0+0xc0/0xe0\n[   47.084776]  kasan_slab_alloc+0x14/0x20\n[   47.088622]  kmem_cache_alloc+0x15c/0x468\n[   47.092643]  __alloc_skb+0xa4/0x498\n[   47.096142]  igmpv3_newpack+0x158/0xd78\n[   47.099987]  add_grhead+0x210/0x288\n[   47.103485]  add_grec+0x6b0/0xb70\n[   47.106811]  igmpv3_send_cr+0x2e0/0x6b8\n[   47.110657]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.115027]  call_timer_fn+0x1cc/0xbe8\n[   47.118785]  __run_timers+0x4d8/0xb28\n[   47.122457]  run_timer_softirq+0x24/0x40\n[   47.126389]  __do_softirq+0x2c0/0x117c\n[   47.130142]\n[   47.131643] Freed by task 180:\n[   47.134712]  save_stack+0x24/0xb0\n[   47.138041]  __kasan_slab_free+0x108/0x180\n[   47.142146]  kasan_slab_free+0x10/0x18\n[   47.145904]  slab_free_freelist_hook+0xa4/0x1b0\n[   47.150444]  kmem_cache_free+0x8c/0x528\n[   47.154292]  kfree_skbmem+0x94/0x108\n[   47.157880]  consume_skb+0x10c/0x5a8\n[   47.161466]  __dev_kfree_skb_any+0x88/0xa0\n[   47.165598]  brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]\n[   47.171023]  brcmf_txfinalize+0xec/0x190 [brcmfmac]\n[   47.176016]  brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]\n[   47.182056]  brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]\n[   47.187568]  brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]\n[   47.192529]  brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]\n[   47.197859]  process_one_work+0x7fc/0x1a80\n[   47.201965]  worker_thread+0x31c/0xc40\n[   47.205726]  kthread+0x2d8/0x370\n[   47.208967]  ret_from_fork+0x10/0x18\n[   47.212546]\n[   47.214051] The buggy address belongs to the object at ffffff803f588280\n[   47.214051]  which belongs to the cache skbuff_head_cache of size 208\n[   47.227086] The buggy address is located 104 bytes inside of\n[   47.227086]  208-byte region [ffffff803f588280, ffffff803f588350)\n[   47.238814] The buggy address belongs to the page:\n[   47.243618] page:ffffffff00dd6200 refcount:1 mapcou\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50408"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560",
          "url": "https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02",
          "url": "https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e",
          "url": "https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478",
          "url": "https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2",
          "url": "https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96",
          "url": "https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df",
          "url": "https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed",
          "url": "https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37892",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: inftlcore: Add error check for inftl_read_oob()\n\nIn INFTL_findwriteunit(), the return value of inftl_read_oob()\nneed to be checked. A proper implementation can be\nfound in INFTL_deleteblock(). The status will be set as\nSECTOR_IGNORE to break from the while-loop correctly\nif the inftl_read_oob() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37892"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693",
          "url": "https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386",
          "url": "https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18",
          "url": "https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6",
          "url": "https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5",
          "url": "https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023",
          "url": "https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b",
          "url": "https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c",
          "url": "https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e",
          "url": "https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-20T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39863",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work\n\nThe brcmf_btcoex_detach() only shuts down the btcoex timer, if the\nflag timer_on is false. However, the brcmf_btcoex_timerfunc(), which\nruns as timer handler, sets timer_on to false. This creates critical\nrace conditions:\n\n1.If brcmf_btcoex_detach() is called while brcmf_btcoex_timerfunc()\nis executing, it may observe timer_on as false and skip the call to\ntimer_shutdown_sync().\n\n2.The brcmf_btcoex_timerfunc() may then reschedule the brcmf_btcoex_info\nworker after the cancel_work_sync() has been executed, resulting in\nuse-after-free bugs.\n\nThe use-after-free bugs occur in two distinct scenarios, depending on\nthe timing of when the brcmf_btcoex_info struct is freed relative to\nthe execution of its worker thread.\n\nScenario 1: Freed before the worker is scheduled\n\nThe brcmf_btcoex_info is deallocated before the worker is scheduled.\nA race condition can occur when schedule_work(&bt_local->work) is\ncalled after the target memory has been freed. The sequence of events\nis detailed below:\n\nCPU0                           | CPU1\nbrcmf_btcoex_detach            | brcmf_btcoex_timerfunc\n                               |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)   |\n    ...                        |\n  cancel_work_sync();          |\n  ...                          |\n  kfree(cfg->btcoex); // FREE  |\n                               |   schedule_work(&bt_local->work); // USE\n\nScenario 2: Freed after the worker is scheduled\n\nThe brcmf_btcoex_info is freed after the worker has been scheduled\nbut before or during its execution. In this case, statements within\nthe brcmf_btcoex_handler() — such as the container_of macro and\nsubsequent dereferences of the brcmf_btcoex_info object will cause\na use-after-free access. The following timeline illustrates this\nscenario:\n\nCPU0                            | CPU1\nbrcmf_btcoex_detach             | brcmf_btcoex_timerfunc\n                                |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)    |\n    ...                         |\n  cancel_work_sync();           |\n  ...                           |   schedule_work(); // Reschedule\n                                |\n  kfree(cfg->btcoex); // FREE   |   brcmf_btcoex_handler() // Worker\n  /*                            |     btci = container_of(....); // USE\n   The kfree() above could      |     ...\n   also occur at any point      |     btci-> // USE\n   during the worker's execution|\n   */                           |\n\nTo resolve the race conditions, drop the conditional check and call\ntimer_shutdown_sync() directly. It can deactivate the timer reliably,\nregardless of its current state. Once stopped, the timer_on state is\nthen set to false.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39863"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625",
          "url": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7",
          "url": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc",
          "url": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63",
          "url": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50419",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sysfs: Fix attempting to call device_add multiple times\n\ndevice_add shall not be called multiple times as stated in its\ndocumentation:\n\n 'Do not call this routine or device_register() more than once for\n any device structure'\n\nSyzkaller reports a bug as follows [1]:\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:33!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN\n[...]\nCall Trace:\n <TASK>\n __list_add include/linux/list.h:69 [inline]\n list_add_tail include/linux/list.h:102 [inline]\n kobj_kset_join lib/kobject.c:164 [inline]\n kobject_add_internal+0x18f/0x8f0 lib/kobject.c:214\n kobject_add_varg lib/kobject.c:358 [inline]\n kobject_add+0x150/0x1c0 lib/kobject.c:410\n device_add+0x368/0x1e90 drivers/base/core.c:3452\n hci_conn_add_sysfs+0x9b/0x1b0 net/bluetooth/hci_sysfs.c:53\n hci_le_cis_estabilished_evt+0x57c/0xae0 net/bluetooth/hci_event.c:6799\n hci_le_meta_evt+0x2b8/0x510 net/bluetooth/hci_event.c:7110\n hci_event_func net/bluetooth/hci_event.c:7440 [inline]\n hci_event_packet+0x63d/0xfd0 net/bluetooth/hci_event.c:7495\n hci_rx_work+0xae7/0x1230 net/bluetooth/hci_core.c:4007\n process_one_work+0x991/0x1610 kernel/workqueue.c:2289\n worker_thread+0x665/0x1080 kernel/workqueue.c:2436\n kthread+0x2e4/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50419"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b6c89571f453101251201f0fad1c26f7256e937",
          "url": "https://git.kernel.org/stable/c/1b6c89571f453101251201f0fad1c26f7256e937"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3423a50fa018e88aed4c900d59c3c8334d8ad583",
          "url": "https://git.kernel.org/stable/c/3423a50fa018e88aed4c900d59c3c8334d8ad583"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/448a496f760664d3e2e79466aa1787e6abc922b5",
          "url": "https://git.kernel.org/stable/c/448a496f760664d3e2e79466aa1787e6abc922b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bcefec3636208b4c97536b26014d5935d5c10a0",
          "url": "https://git.kernel.org/stable/c/4bcefec3636208b4c97536b26014d5935d5c10a0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6144423712d570247b8ca26e50a277c30dd13702",
          "url": "https://git.kernel.org/stable/c/6144423712d570247b8ca26e50a277c30dd13702"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/671fee73e08ff415d36a7c16bdf238927df83884",
          "url": "https://git.kernel.org/stable/c/671fee73e08ff415d36a7c16bdf238927df83884"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e85d2ad958c6f034b1b158d904019869dbb3c81",
          "url": "https://git.kernel.org/stable/c/6e85d2ad958c6f034b1b158d904019869dbb3c81"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b674dce4162bb46d396586e30e4653427023875",
          "url": "https://git.kernel.org/stable/c/7b674dce4162bb46d396586e30e4653427023875"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef055094df4c10b73cfe67c8d43f9de1fb608a8b",
          "url": "https://git.kernel.org/stable/c/ef055094df4c10b73cfe67c8d43f9de1fb608a8b"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37780",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Prevent the use of too small fid\n\nsyzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1]\n\nThe handle_bytes value passed in by the reproducing program is equal to 12.\nIn handle_to_path(), only 12 bytes of memory are allocated for the structure\nfile_handle->f_handle member, which causes an out-of-bounds access when\naccessing the member parent_block of the structure isofs_fid in isofs,\nbecause accessing parent_block requires at least 16 bytes of f_handle.\nHere, fh_len is used to indirectly confirm that the value of handle_bytes\nis greater than 3 before accessing parent_block.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\nRead of size 4 at addr ffff0000cc030d94 by task syz-executor215/6466\nCPU: 1 UID: 0 PID: 6466 Comm: syz-executor215 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall trace:\n show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0x198/0x550 mm/kasan/report.c:521\n kasan_report+0xd8/0x138 mm/kasan/report.c:634\n __asan_report_load4_noabort+0x20/0x2c mm/kasan/report_generic.c:380\n isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\n exportfs_decode_fh_raw+0x2dc/0x608 fs/exportfs/expfs.c:523\n do_handle_to_path+0xa0/0x198 fs/fhandle.c:257\n handle_to_path fs/fhandle.c:385 [inline]\n do_handle_open+0x8cc/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n\nAllocated by task 6466:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x40/0x78 mm/kasan/common.c:68\n kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:562\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4294 [inline]\n __kmalloc_noprof+0x32c/0x54c mm/slub.c:4306\n kmalloc_noprof include/linux/slab.h:905 [inline]\n handle_to_path fs/fhandle.c:357 [inline]\n do_handle_open+0x5a4/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37780"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/007124c896e7d4614ac1f6bd4dedb975c35a2a8e",
          "url": "https://git.kernel.org/stable/c/007124c896e7d4614ac1f6bd4dedb975c35a2a8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0405d4b63d082861f4eaff9d39c78ee9dc34f845",
          "url": "https://git.kernel.org/stable/c/0405d4b63d082861f4eaff9d39c78ee9dc34f845"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0fdafdaef796816a9ed0fd7ac812932d569d9beb",
          "url": "https://git.kernel.org/stable/c/0fdafdaef796816a9ed0fd7ac812932d569d9beb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56dfffea9fd3be0b3795a9ca6401e133a8427e0b",
          "url": "https://git.kernel.org/stable/c/56dfffea9fd3be0b3795a9ca6401e133a8427e0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e7de55602c61c8ff28db075cc49c8dd6989d7e0",
          "url": "https://git.kernel.org/stable/c/5e7de55602c61c8ff28db075cc49c8dd6989d7e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63d5a3e207bf315a32c7d16de6c89753a759f95a",
          "url": "https://git.kernel.org/stable/c/63d5a3e207bf315a32c7d16de6c89753a759f95a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/952e7a7e317f126d0a2b879fc531b716932d5ffa",
          "url": "https://git.kernel.org/stable/c/952e7a7e317f126d0a2b879fc531b716932d5ffa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee01a309ebf598be1ff8174901ed6e91619f1749",
          "url": "https://git.kernel.org/stable/c/ee01a309ebf598be1ff8174901ed6e91619f1749"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38004",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: add locking for bcm_op runtime updates\n\nThe CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via\nhrtimer. The content and also the length of the sequence can be changed\nresp reduced at runtime where the 'currframe' counter is then set to zero.\n\nAlthough this appeared to be a safe operation the updates of 'currframe'\ncan be triggered from user space and hrtimer context in bcm_can_tx().\nAnderson Nascimento created a proof of concept that triggered a KASAN\nslab-out-of-bounds read access which can be prevented with a spin_lock_bh.\n\nAt the rework of bcm_can_tx() the 'count' variable has been moved into\nthe protected section as this variable can be modified from both contexts\ntoo.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38004"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a437b86ac5a9893c902f30ef66815bf13587bf6",
          "url": "https://git.kernel.org/stable/c/2a437b86ac5a9893c902f30ef66815bf13587bf6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7595de7bc56e0e52b74e56c90f7e247bf626d628",
          "url": "https://git.kernel.org/stable/c/7595de7bc56e0e52b74e56c90f7e247bf626d628"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76c84c3728178b2d38d5604e399dfe8b0752645e",
          "url": "https://git.kernel.org/stable/c/76c84c3728178b2d38d5604e399dfe8b0752645e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f1c022541bf5a923c8d6fa483112c15250f30a4",
          "url": "https://git.kernel.org/stable/c/8f1c022541bf5a923c8d6fa483112c15250f30a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7",
          "url": "https://git.kernel.org/stable/c/c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4e8a172501e677ebd8ea9d9161d97dc4df56fbd",
          "url": "https://git.kernel.org/stable/c/c4e8a172501e677ebd8ea9d9161d97dc4df56fbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc55dd28c20a6611e30596019b3b2f636819a4c0",
          "url": "https://git.kernel.org/stable/c/cc55dd28c20a6611e30596019b3b2f636819a4c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fbd8fdc2b218e979cfe422b139b8f74c12419d1f",
          "url": "https://git.kernel.org/stable/c/fbd8fdc2b218e979cfe422b139b8f74c12419d1f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-08T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53373",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Handle EBUSY correctly\n\nAs it is seqiv only handles the special return value of EINPROGERSS,\nwhich means that in all other cases it will free data related to the\nrequest.\n\nHowever, as the caller of seqiv may specify MAY_BACKLOG, we also need\nto expect EBUSY and treat it in the same way.  Otherwise backlogged\nrequests will trigger a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
          "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
          "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
          "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53373"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
          "url": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc",
          "url": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620",
          "url": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771",
          "url": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
          "url": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36",
          "url": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971",
          "url": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719",
          "url": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-17T16:58:50.832511Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128",
          "product_ids": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1768669128"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.i686",
            "CentOS-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els28.noarch",
            "CentOS-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64",
            "CentOS-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els28.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}