{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "xfrm: Duplicate SPI Handling {CVE-2025-39965}\n- xfrm: state: use atomic_inc_not_zero to increment refcount\n- padata: Fix pd UAF once and for all {CVE-2025-38584}\n- padata: Remove broken queue flushing {CVE-2023-52854}\n- padata: ensure padata_do_serial() runs on the correct CPU\n- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}\n- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718}\n- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}\n- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640}\n- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}\n- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}\n- ipvs: use explicitly signed chars\n- vt: Clear selection before changing the font {CVE-2022-49948}\n- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}\n- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}\n- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}\n- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}\n- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}\n- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}\n- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}\n- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}\n- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}\n- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}\n- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}\n- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}\n- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}\n- net_sched: hfsc: Fix a UAF vulnerability in class handling\n- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/advisories/2025/clsa-2025_1766617167.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
      }
    ],
    "tracking": {
      "current_release_date": "2026-01-21T14:14:20Z",
      "generator": {
        "date": "2026-01-21T14:14:20Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1766617167",
      "initial_release_date": "2025-12-24T22:59:29Z",
      "revision_history": [
        {
          "date": "2025-12-24T22:59:29Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-01-12T15:20:14Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2026-01-21T14:14:20Z",
          "number": "3",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "3"
    },
    "title": "kernel: Fix of 27 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python-perf@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-53117",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53117"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69",
          "url": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4",
          "url": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf",
          "url": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830",
          "url": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06",
          "url": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a",
          "url": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b",
          "url": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315",
          "url": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49918",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix WARNING in __ip_vs_cleanup_batch()\n\nDuring the initialization of ip_vs_conn_net_init(), if file ip_vs_conn\nor ip_vs_conn_sync fails to be created, the initialization is successful\nby default. Therefore, the ip_vs_conn or ip_vs_conn_sync file doesn't\nbe found during the remove.\n\nThe following is the stack information:\nname 'ip_vs_conn_sync'\nWARNING: CPU: 3 PID: 9 at fs/proc/generic.c:712\nremove_proc_entry+0x389/0x460\nModules linked in:\nWorkqueue: netns cleanup_net\nRIP: 0010:remove_proc_entry+0x389/0x460\nCall Trace:\n<TASK>\n__ip_vs_cleanup_batch+0x7d/0x120\nops_exit_list+0x125/0x170\ncleanup_net+0x4ea/0xb00\nprocess_one_work+0x9bf/0x1710\nworker_thread+0x665/0x1080\nkthread+0x2e4/0x3a0\nret_from_fork+0x1f/0x30\n</TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49918"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d00c6a0da8ddcf75213e004765e4a42acc71d5d",
          "url": "https://git.kernel.org/stable/c/3d00c6a0da8ddcf75213e004765e4a42acc71d5d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ee2d6b726b0ce339e36569e5849692f4cf4595e",
          "url": "https://git.kernel.org/stable/c/5ee2d6b726b0ce339e36569e5849692f4cf4595e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7effc4ce3d1434ce6ff286866585a6e905fdbfc1",
          "url": "https://git.kernel.org/stable/c/7effc4ce3d1434ce6ff286866585a6e905fdbfc1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/931f56d59c854263b32075bfac56fdb3b1598d1b",
          "url": "https://git.kernel.org/stable/c/931f56d59c854263b32075bfac56fdb3b1598d1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e724220b826e008764309d2a1f55a9434a4e1530",
          "url": "https://git.kernel.org/stable/c/e724220b826e008764309d2a1f55a9434a4e1530"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f08ee2aa24c076f81d84e26e213d8c6f4efd9f50",
          "url": "https://git.kernel.org/stable/c/f08ee2aa24c076f81d84e26e213d8c6f4efd9f50"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-37839",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: remove wrong sb->s_sequence check\n\nJournal emptiness is not determined by sb->s_sequence == 0 but rather by\nsb->s_start == 0 (which is set a few lines above). Furthermore 0 is a\nvalid transaction ID so the check can spuriously trigger. Remove the\ninvalid WARN_ON.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77",
          "url": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457",
          "url": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac",
          "url": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf",
          "url": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1",
          "url": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b",
          "url": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0",
          "url": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6",
          "url": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148",
          "url": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50258",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()\n\nThis patch fixes a stack-out-of-bounds read in brcmfmac that occurs\nwhen 'buf' that is not null-terminated is passed as an argument of\nstrsep() in brcmf_c_preinit_dcmds(). This buffer is filled with a firmware\nversion string by memcpy() in brcmf_fil_iovar_data_get().\nThe patch ensures buf is null-terminated.\n\nFound by a modified version of syzkaller.\n\n[   47.569679][ T1897] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43236b for chip BCM43236/3\n[   47.582839][ T1897] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available\n[   47.601565][ T1897] ==================================================================\n[   47.602574][ T1897] BUG: KASAN: stack-out-of-bounds in strsep+0x1b2/0x1f0\n[   47.603447][ T1897] Read of size 1 at addr ffffc90001f6f000 by task kworker/0:2/1897\n[   47.604336][ T1897]\n[   47.604621][ T1897] CPU: 0 PID: 1897 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #131\n[   47.605617][ T1897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\n[   47.606907][ T1897] Workqueue: usb_hub_wq hub_event\n[   47.607453][ T1897] Call Trace:\n[   47.607801][ T1897]  dump_stack_lvl+0x8e/0xd1\n[   47.608295][ T1897]  print_address_description.constprop.0.cold+0xf/0x334\n[   47.609009][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609434][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609863][ T1897]  kasan_report.cold+0x83/0xdf\n[   47.610366][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.610882][ T1897]  strsep+0x1b2/0x1f0\n[   47.611300][ T1897]  ? brcmf_fil_iovar_data_get+0x3a/0xf0\n[   47.611883][ T1897]  brcmf_c_preinit_dcmds+0x995/0xc40\n[   47.612434][ T1897]  ? brcmf_c_set_joinpref_default+0x100/0x100\n[   47.613078][ T1897]  ? rcu_read_lock_sched_held+0xa1/0xd0\n[   47.613662][ T1897]  ? rcu_read_lock_bh_held+0xb0/0xb0\n[   47.614208][ T1897]  ? lock_acquire+0x19d/0x4e0\n[   47.614704][ T1897]  ? find_held_lock+0x2d/0x110\n[   47.615236][ T1897]  ? brcmf_usb_deq+0x1a7/0x260\n[   47.615741][ T1897]  ? brcmf_usb_rx_fill_all+0x5a/0xf0\n[   47.616288][ T1897]  brcmf_attach+0x246/0xd40\n[   47.616758][ T1897]  ? wiphy_new_nm+0x1703/0x1dd0\n[   47.617280][ T1897]  ? kmemdup+0x43/0x50\n[   47.617720][ T1897]  brcmf_usb_probe+0x12de/0x1690\n[   47.618244][ T1897]  ? brcmf_usbdev_qinit.constprop.0+0x470/0x470\n[   47.618901][ T1897]  usb_probe_interface+0x2aa/0x760\n[   47.619429][ T1897]  ? usb_probe_device+0x250/0x250\n[   47.619950][ T1897]  really_probe+0x205/0xb70\n[   47.620435][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.621048][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.621595][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.622209][ T1897]  driver_probe_device+0x4e/0x150\n[   47.622739][ T1897]  __device_attach_driver+0x1cc/0x2a0\n[   47.623287][ T1897]  bus_for_each_drv+0x156/0x1d0\n[   47.623796][ T1897]  ? bus_rescan_devices+0x30/0x30\n[   47.624309][ T1897]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n[   47.624907][ T1897]  ? trace_hardirqs_on+0x46/0x160\n[   47.625437][ T1897]  __device_attach+0x23f/0x3a0\n[   47.625924][ T1897]  ? device_bind_driver+0xd0/0xd0\n[   47.626433][ T1897]  ? kobject_uevent_env+0x287/0x14b0\n[   47.627057][ T1897]  bus_probe_device+0x1da/0x290\n[   47.627557][ T1897]  device_add+0xb7b/0x1eb0\n[   47.628027][ T1897]  ? wait_for_completion+0x290/0x290\n[   47.628593][ T1897]  ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0\n[   47.629249][ T1897]  usb_set_configuration+0xf59/0x16f0\n[   47.629829][ T1897]  usb_generic_driver_probe+0x82/0xa0\n[   47.630385][ T1897]  usb_probe_device+0xbb/0x250\n[   47.630927][ T1897]  ? usb_suspend+0x590/0x590\n[   47.631397][ T1897]  really_probe+0x205/0xb70\n[   47.631855][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.632469][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.633002][ \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50258"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69",
          "url": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0",
          "url": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c",
          "url": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c",
          "url": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f",
          "url": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7",
          "url": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0",
          "url": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4",
          "url": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38718",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: linearize cloned gso packets in sctp_rcv\n\nA cloned head skb still shares these frag skbs in fraglist with the\noriginal head skb. It's not safe to access these frag skbs.\n\nsyzbot reported two use-of-uninitialized-memory bugs caused by this:\n\n  BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\n   sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\n   sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998\n   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88\n   sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331\n   sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122\n   __release_sock+0x1da/0x330 net/core/sock.c:3106\n   release_sock+0x6b/0x250 net/core/sock.c:3660\n   sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360\n   sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885\n   sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031\n   inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851\n   sock_sendmsg_nosec net/socket.c:718 [inline]\n\nand\n\n  BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\n   sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\n   sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88\n   sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331\n   sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n   __release_sock+0x1d3/0x330 net/core/sock.c:3213\n   release_sock+0x6b/0x270 net/core/sock.c:3767\n   sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367\n   sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886\n   sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032\n   inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851\n   sock_sendmsg_nosec net/socket.c:712 [inline]\n\nThis patch fixes it by linearizing cloned gso packets in sctp_rcv().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38718"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03d0cc6889e02420125510b5444b570f4bbf53d5",
          "url": "https://git.kernel.org/stable/c/03d0cc6889e02420125510b5444b570f4bbf53d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1bd5214ea681584c5886fea3ba03e49f93a43c0e",
          "url": "https://git.kernel.org/stable/c/1bd5214ea681584c5886fea3ba03e49f93a43c0e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d757f17bc2ef2727994ffa6d5d6e4bc4789a770",
          "url": "https://git.kernel.org/stable/c/7d757f17bc2ef2727994ffa6d5d6e4bc4789a770"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd0e92bb2b7542fb96397ffac639b4f5b099d0cb",
          "url": "https://git.kernel.org/stable/c/cd0e92bb2b7542fb96397ffac639b4f5b099d0cb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d0194e391bb493aa6cec56d177b14df6b29188d5",
          "url": "https://git.kernel.org/stable/c/d0194e391bb493aa6cec56d177b14df6b29188d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea094f38d387d1b0ded5dee4a3e5720aa4ce0139",
          "url": "https://git.kernel.org/stable/c/ea094f38d387d1b0ded5dee4a3e5720aa4ce0139"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc66772607101bd2030a4332b3bd0ea3b3605250",
          "url": "https://git.kernel.org/stable/c/fc66772607101bd2030a4332b3bd0ea3b3605250"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd60d8a086191fe33c2d719732d2482052fa6805",
          "url": "https://git.kernel.org/stable/c/fd60d8a086191fe33c2d719732d2482052fa6805"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38584",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix pd UAF once and for all\n\nThere is a race condition/UAF in padata_reorder that goes back\nto the initial commit.  A reference count is taken at the start\nof the process in padata_do_parallel, and released at the end in\npadata_serial_worker.\n\nThis reference count is (and only is) required for padata_replace\nto function correctly.  If padata_replace is never called then\nthere is no issue.\n\nIn the function padata_reorder which serves as the core of padata,\nas soon as padata is added to queue->serial.list, and the associated\nspin lock released, that padata may be processed and the reference\ncount on pd would go away.\n\nFix this by getting the next padata before the squeue->serial lock\nis released.\n\nIn order to make this possible, simplify padata_reorder by only\ncalling it once the next padata arrives.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38584"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91",
          "url": "https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52",
          "url": "https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa",
          "url": "https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50252",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Do not free q_vector unless new one was allocated\n\nAvoid potential use-after-free condition under memory pressure. If the\nkzalloc() fails, q_vector will be freed but left in the original\nadapter->q_vector[v_idx] array position.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50252"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633",
          "url": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801",
          "url": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8",
          "url": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff",
          "url": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c",
          "url": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803",
          "url": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3",
          "url": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a",
          "url": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075",
          "url": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37882",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix isochronous Ring Underrun/Overrun event handling\n\nThe TRB pointer of these events points at enqueue at the time of error\noccurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we\nare handling the event, a new TD may be queued at this ring position.\n\nI can trigger this race by rising interrupt moderation to increase IRQ\nhandling delay. Similar delay may occur naturally due to system load.\n\nIf this ever happens after a Missed Service Error, missed TDs will be\nskipped and the new TD processed as if it matched the event. It could\nbe given back prematurely, risking data loss or buffer UAF by the xHC.\n\nDon't complete TDs on xrun events and don't warn if queued TDs don't\nmatch the event's TRB pointer, which can be NULL or a link/no-op TRB.\nDon't warn if there are no queued TDs at all.\n\nNow that it's safe, also handle xrun events if the skip flag is clear.\nThis ensures completion of any TD stuck in 'error mid TD' state right\nbefore the xrun event, which could happen if a driver submits a finite\nnumber of URBs to a buggy HC and then an error occurs on the last TD.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37882"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915",
          "url": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454",
          "url": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4",
          "url": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39965",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nxfrm: xfrm_alloc_spi shouldn't use 0 as SPI\nx->id.spi == 0 means \"no SPI assigned\", but since commit\n94f39804d891 (\"xfrm: Duplicate SPI Handling\"), we now create states\nand add them to the byspi list with this value.\n__xfrm_state_delete doesn't remove those states from the byspi list,\nsince they shouldn't be there, and this shows up as a UAF the next\ntime we go through the byspi list.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39965"
        }
      ],
      "release_date": "2025-10-13T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-53365",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6mr: Fix skb_under_panic in ip6mr_cache_report()\n\nskbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4\n head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg\n ------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:192!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: ipv6_addrconf addrconf_dad_work\n RIP: 0010:skb_panic+0x152/0x1d0\n Call Trace:\n  <TASK>\n  skb_push+0xc4/0xe0\n  ip6mr_cache_report+0xd69/0x19b0\n  reg_vif_xmit+0x406/0x690\n  dev_hard_start_xmit+0x17e/0x6e0\n  __dev_queue_xmit+0x2d6a/0x3d20\n  vlan_dev_hard_start_xmit+0x3ab/0x5c0\n  dev_hard_start_xmit+0x17e/0x6e0\n  __dev_queue_xmit+0x2d6a/0x3d20\n  neigh_connected_output+0x3ed/0x570\n  ip6_finish_output2+0x5b5/0x1950\n  ip6_finish_output+0x693/0x11c0\n  ip6_output+0x24b/0x880\n  NF_HOOK.constprop.0+0xfd/0x530\n  ndisc_send_skb+0x9db/0x1400\n  ndisc_send_rs+0x12a/0x6c0\n  addrconf_dad_completed+0x3c9/0xea0\n  addrconf_dad_work+0x849/0x1420\n  process_one_work+0xa22/0x16e0\n  worker_thread+0x679/0x10c0\n  ret_from_fork+0x28/0x60\n  ret_from_fork_asm+0x11/0x20\n\nWhen setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().\nreg_vif_xmit()\n    ip6mr_cache_report()\n        skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4\nAnd skb_push declared as:\n\tvoid *skb_push(struct sk_buff *skb, unsigned int len);\n\t\tskb->data -= len;\n\t\t//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850\nskb->data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53365"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0",
          "url": "https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346",
          "url": "https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4",
          "url": "https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c",
          "url": "https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560",
          "url": "https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb",
          "url": "https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd",
          "url": "https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d",
          "url": "https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d"
        }
      ],
      "release_date": "2025-09-17T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-50084",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_status\n\nThere is this warning when using a kernel with the address sanitizer\nand running this testsuite:\nhttps://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]\nRead of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319\nCPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.<snip> #1\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nCall Trace:\n <TASK>\n dump_stack_lvl+0x6a/0x9c\n print_address_description.constprop.0+0x1f/0x1e0\n print_report.cold+0x55/0x244\n kasan_report+0xc9/0x100\n raid_status+0x1747/0x2820 [dm_raid]\n dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]\n table_load+0x35c/0x630 [dm_mod]\n ctl_ioctl+0x411/0x630 [dm_mod]\n dm_ctl_ioctl+0xa/0x10 [dm_mod]\n __x64_sys_ioctl+0x12a/0x1a0\n do_syscall_64+0x5b/0x80\n\nThe warning is caused by reading conf->max_nr_stripes in raid_status. The\ncode in raid_status reads mddev->private, casts it to struct r5conf and\nreads the entry max_nr_stripes.\n\nHowever, if we have different raid type than 4/5/6, mddev->private\ndoesn't point to struct r5conf; it may point to struct r0conf, struct\nr1conf, struct r10conf or struct mpconf. If we cast a pointer to one\nof these structs to struct r5conf, we will be reading invalid memory\nand KASAN warns about it.\n\nFix this bug by reading struct r5conf only if raid type is 4, 5 or 6.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50084"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1ae0ebfb576b72c2ef400917a5484ebe7892d80b",
          "url": "https://git.kernel.org/stable/c/1ae0ebfb576b72c2ef400917a5484ebe7892d80b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1fbeea217d8f297fe0e0956a1516d14ba97d0396",
          "url": "https://git.kernel.org/stable/c/1fbeea217d8f297fe0e0956a1516d14ba97d0396"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49dba30638e091120256a9e89125340795f034dc",
          "url": "https://git.kernel.org/stable/c/49dba30638e091120256a9e89125340795f034dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4c233811a49578634d10a5e70a9dfa569d451e94",
          "url": "https://git.kernel.org/stable/c/4c233811a49578634d10a5e70a9dfa569d451e94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90b006da40dd42285b24dd3c940d2c32aca9a70b",
          "url": "https://git.kernel.org/stable/c/90b006da40dd42285b24dd3c940d2c32aca9a70b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4c6c07c92b6cba2bf3cb2dfa722debeaf8a8abe",
          "url": "https://git.kernel.org/stable/c/b4c6c07c92b6cba2bf3cb2dfa722debeaf8a8abe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b856ce5f4b55f752144baf17e9d5c415072652c5",
          "url": "https://git.kernel.org/stable/c/b856ce5f4b55f752144baf17e9d5c415072652c5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb583ca6125ac64c98e9d65128e95ebb5be7d322",
          "url": "https://git.kernel.org/stable/c/cb583ca6125ac64c98e9d65128e95ebb5be7d322"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8971b595d7adac3421c21f59918241f1574061e",
          "url": "https://git.kernel.org/stable/c/d8971b595d7adac3421c21f59918241f1574061e"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39751",
      "notes": [
        {
          "category": "description",
          "text": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
          "title": "Vulnerability description"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39751"
        }
      ],
      "release_date": "2025-09-11T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50408",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()\n\n> ret = brcmf_proto_tx_queue_data(drvr, ifp->ifidx, skb);\n\nmay be schedule, and then complete before the line\n\n> ndev->stats.tx_bytes += skb->len;\n\n[   46.912801] ==================================================================\n[   46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328\n[   46.935991]\n[   46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G           O      5.4.199-[REDACTED] #1\n[   46.947255] Hardware name: [REDACTED]\n[   46.954568] Call trace:\n[   46.957037]  dump_backtrace+0x0/0x2b8\n[   46.960719]  show_stack+0x24/0x30\n[   46.964052]  dump_stack+0x128/0x194\n[   46.967557]  print_address_description.isra.0+0x64/0x380\n[   46.972877]  __kasan_report+0x1d4/0x240\n[   46.976723]  kasan_report+0xc/0x18\n[   46.980138]  __asan_report_load4_noabort+0x18/0x20\n[   46.985027]  brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.990613]  dev_hard_start_xmit+0x1bc/0xda0\n[   46.994894]  sch_direct_xmit+0x198/0xd08\n[   46.998827]  __qdisc_run+0x37c/0x1dc0\n[   47.002500]  __dev_queue_xmit+0x1528/0x21f8\n[   47.006692]  dev_queue_xmit+0x24/0x30\n[   47.010366]  neigh_resolve_output+0x37c/0x678\n[   47.014734]  ip_finish_output2+0x598/0x2458\n[   47.018927]  __ip_finish_output+0x300/0x730\n[   47.023118]  ip_output+0x2e0/0x430\n[   47.026530]  ip_local_out+0x90/0x140\n[   47.030117]  igmpv3_sendpack+0x14c/0x228\n[   47.034049]  igmpv3_send_cr+0x384/0x6b8\n[   47.037895]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.042262]  call_timer_fn+0x1cc/0xbe8\n[   47.046021]  __run_timers+0x4d8/0xb28\n[   47.049693]  run_timer_softirq+0x24/0x40\n[   47.053626]  __do_softirq+0x2c0/0x117c\n[   47.057387]  irq_exit+0x2dc/0x388\n[   47.060715]  __handle_domain_irq+0xb4/0x158\n[   47.064908]  gic_handle_irq+0x58/0xb0\n[   47.068581]  el0_irq_naked+0x50/0x5c\n[   47.072162]\n[   47.073665] Allocated by task 328:\n[   47.077083]  save_stack+0x24/0xb0\n[   47.080410]  __kasan_kmalloc.isra.0+0xc0/0xe0\n[   47.084776]  kasan_slab_alloc+0x14/0x20\n[   47.088622]  kmem_cache_alloc+0x15c/0x468\n[   47.092643]  __alloc_skb+0xa4/0x498\n[   47.096142]  igmpv3_newpack+0x158/0xd78\n[   47.099987]  add_grhead+0x210/0x288\n[   47.103485]  add_grec+0x6b0/0xb70\n[   47.106811]  igmpv3_send_cr+0x2e0/0x6b8\n[   47.110657]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.115027]  call_timer_fn+0x1cc/0xbe8\n[   47.118785]  __run_timers+0x4d8/0xb28\n[   47.122457]  run_timer_softirq+0x24/0x40\n[   47.126389]  __do_softirq+0x2c0/0x117c\n[   47.130142]\n[   47.131643] Freed by task 180:\n[   47.134712]  save_stack+0x24/0xb0\n[   47.138041]  __kasan_slab_free+0x108/0x180\n[   47.142146]  kasan_slab_free+0x10/0x18\n[   47.145904]  slab_free_freelist_hook+0xa4/0x1b0\n[   47.150444]  kmem_cache_free+0x8c/0x528\n[   47.154292]  kfree_skbmem+0x94/0x108\n[   47.157880]  consume_skb+0x10c/0x5a8\n[   47.161466]  __dev_kfree_skb_any+0x88/0xa0\n[   47.165598]  brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]\n[   47.171023]  brcmf_txfinalize+0xec/0x190 [brcmfmac]\n[   47.176016]  brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]\n[   47.182056]  brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]\n[   47.187568]  brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]\n[   47.192529]  brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]\n[   47.197859]  process_one_work+0x7fc/0x1a80\n[   47.201965]  worker_thread+0x31c/0xc40\n[   47.205726]  kthread+0x2d8/0x370\n[   47.208967]  ret_from_fork+0x10/0x18\n[   47.212546]\n[   47.214051] The buggy address belongs to the object at ffffff803f588280\n[   47.214051]  which belongs to the cache skbuff_head_cache of size 208\n[   47.227086] The buggy address is located 104 bytes inside of\n[   47.227086]  208-byte region [ffffff803f588280, ffffff803f588350)\n[   47.238814] The buggy address belongs to the page:\n[   47.243618] page:ffffffff00dd6200 refcount:1 mapcou\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50408"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560",
          "url": "https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02",
          "url": "https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e",
          "url": "https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478",
          "url": "https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2",
          "url": "https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96",
          "url": "https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df",
          "url": "https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed",
          "url": "https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49907",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: fix undefined behavior in bit shift for __mdiobus_register\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in drivers/net/phy/mdio_bus.c:586:27\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n __mdiobus_register+0x49d/0x4e0\n fixed_mdio_bus_init+0xd8/0x12d\n do_one_initcall+0x76/0x430\n kernel_init_freeable+0x3b3/0x422\n kernel_init+0x24/0x1e0\n ret_from_fork+0x1f/0x30\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49907"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7",
          "url": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a",
          "url": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2",
          "url": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d",
          "url": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0",
          "url": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e",
          "url": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d",
          "url": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973",
          "url": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48900",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved:\nxen/netfront: react properly to failing gnttab_end_foreign_access_ref()",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48900"
        }
      ],
      "release_date": "2024-08-22T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-53373",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Handle EBUSY correctly\n\nAs it is seqiv only handles the special return value of EINPROGERSS,\nwhich means that in all other cases it will free data related to the\nrequest.\n\nHowever, as the caller of seqiv may specify MAY_BACKLOG, we also need\nto expect EBUSY and treat it in the same way.  Otherwise backlogged\nrequests will trigger a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53373"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
          "url": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc",
          "url": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620",
          "url": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771",
          "url": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
          "url": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36",
          "url": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971",
          "url": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719",
          "url": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix use-after-free\n\nFix potential use-after-free in l2cap_le_command_rej.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
          "url": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
          "url": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8",
          "url": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
          "url": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
          "url": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b",
          "url": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f",
          "url": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df",
          "url": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49917",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix WARNING in ip_vs_app_net_cleanup()\n\nDuring the initialization of ip_vs_app_net_init(), if file ip_vs_app\nfails to be created, the initialization is successful by default.\nTherefore, the ip_vs_app file doesn't be found during the remove in\nip_vs_app_net_cleanup(). It will cause WRNING.\n\nThe following is the stack information:\nname 'ip_vs_app'\nWARNING: CPU: 1 PID: 9 at fs/proc/generic.c:712 remove_proc_entry+0x389/0x460\nModules linked in:\nWorkqueue: netns cleanup_net\nRIP: 0010:remove_proc_entry+0x389/0x460\nCall Trace:\n<TASK>\nops_exit_list+0x125/0x170\ncleanup_net+0x4ea/0xb00\nprocess_one_work+0x9bf/0x1710\nworker_thread+0x665/0x1080\nkthread+0x2e4/0x3a0\nret_from_fork+0x1f/0x30\n</TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49917"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/06d7596d18725f1a93cf817662d36050e5afb989",
          "url": "https://git.kernel.org/stable/c/06d7596d18725f1a93cf817662d36050e5afb989"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2c8d81bdb2684d53d6cedad7410ba4cf9090e343",
          "url": "https://git.kernel.org/stable/c/2c8d81bdb2684d53d6cedad7410ba4cf9090e343"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5663ed63adb9619c98ab7479aa4606fa9b7a548c",
          "url": "https://git.kernel.org/stable/c/5663ed63adb9619c98ab7479aa4606fa9b7a548c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8457a00c981fe1a799ce34123908856b0f5973b8",
          "url": "https://git.kernel.org/stable/c/8457a00c981fe1a799ce34123908856b0f5973b8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97f872b00937f2689bff2dab4ad9ed259482840f",
          "url": "https://git.kernel.org/stable/c/97f872b00937f2689bff2dab4ad9ed259482840f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adc76740ccd52e4a1d910767cd1223e134a7078b",
          "url": "https://git.kernel.org/stable/c/adc76740ccd52e4a1d910767cd1223e134a7078b"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53000",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n    u16 type = nla_type(nla);\n\n    if (type == 0 || type > maxtype) {\n        /* error or continue */\n    }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff",
          "url": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45",
          "url": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d",
          "url": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184",
          "url": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455",
          "url": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455"
        }
      ],
      "release_date": "2025-03-27T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-21546",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix WRITE_SAME No Data Buffer crash\n\nIn newer version of the SBC specs, we have a NDOB bit that indicates there\nis no data buffer that gets written out. If this bit is set using commands\nlike \"sg_write_same --ndob\" we will crash in target_core_iblock/file's\nexecute_write_same handlers when we go to access the se_cmd->t_data_sg\nbecause its NULL.\n\nThis patch adds a check for the NDOB bit in the common WRITE SAME code\nbecause we don't support it. And, it adds a check for zero SG elements in\neach handler in case the initiator tries to send a normal WRITE SAME with\nno data buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-21546"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510",
          "url": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b",
          "url": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29",
          "url": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899",
          "url": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-02T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38250",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix use-after-free in vhci_flush()\n\nsyzbot reported use-after-free in vhci_flush() without repro. [0]\n\nFrom the splat, a thread close()d a vhci file descriptor while\nits device was being used by iotcl() on another thread.\n\nOnce the last fd refcnt is released, vhci_release() calls\nhci_unregister_dev(), hci_free_dev(), and kfree() for struct\nvhci_data, which is set to hci_dev->dev->driver_data.\n\nThe problem is that there is no synchronisation after unlinking\nhdev from hci_dev_list in hci_unregister_dev().  There might be\nanother thread still accessing the hdev which was fetched before\nthe unlink operation.\n\nWe can use SRCU for such synchronisation.\n\nLet's run hci_dev_reset() under SRCU and wait for its completion\nin hci_unregister_dev().\n\nAnother option would be to restore hci_dev->destruct(), which was\nremoved in commit 587ae086f6e4 (\"Bluetooth: Remove unused\nhci-destruct cb\").  However, this would not be a good solution, as\nwe should not run hci_unregister_dev() while there are in-flight\nioctl() requests, which could lead to another data-race KCSAN splat.\n\nNote that other drivers seem to have the same problem, for exmaple,\nvirtbt_remove().\n\n[0]:\nBUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\nBUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\nRead of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718\n\nCPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xd2/0x2b0 mm/kasan/report.c:521\n kasan_report+0x118/0x150 mm/kasan/report.c:634\n skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\n skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\n skb_queue_purge include/linux/skbuff.h:3368 [inline]\n vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69\n hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline]\n hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592\n sock_do_ioctl+0xd9/0x300 net/socket.c:1190\n sock_ioctl+0x576/0x790 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcf5b98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929\nRDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009\nRBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528\n </TASK>\n\nAllocated by task 6535:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359\n kmalloc_noprof include/linux/slab.h:905 [inline]\n kzalloc_noprof include/linux/slab.h:1039 [inline]\n vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635\n misc_open+0x2bc/0x330 drivers/char/misc.c:161\n chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414\n do_dentry_open+0xdf0/0x1970 fs/open.c:964\n vfs_open+0x3b/0x340 fs/open.c:1094\n do_open fs/namei.c:3887 [inline]\n path_openat+0x2ee5/0x3830 fs/name\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38250"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65",
          "url": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e",
          "url": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7",
          "url": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6",
          "url": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49870",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncapabilities: fix undefined behavior in bit shift for CAP_TO_MASK\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in security/commoncap.c:1252:2\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n cap_task_prctl+0x561/0x6f0\n security_task_prctl+0x5a/0xb0\n __x64_sys_prctl+0x61/0x8f0\n do_syscall_64+0x58/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49870"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/151dc8087b5609e53b069c068e3f3ee100efa586",
          "url": "https://git.kernel.org/stable/c/151dc8087b5609e53b069c068e3f3ee100efa586"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27bdb134c043ff32c459d98f16550d0ffa0b3c34",
          "url": "https://git.kernel.org/stable/c/27bdb134c043ff32c459d98f16550d0ffa0b3c34"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13",
          "url": "https://git.kernel.org/stable/c/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5661f111a1616ac105ec8cec81bff99b60f847ac",
          "url": "https://git.kernel.org/stable/c/5661f111a1616ac105ec8cec81bff99b60f847ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b79fa628e2ab789e629a83cd211ef9b4c1a593e",
          "url": "https://git.kernel.org/stable/c/5b79fa628e2ab789e629a83cd211ef9b4c1a593e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65b0bc7a0690861812ade523d19f82688ab819dc",
          "url": "https://git.kernel.org/stable/c/65b0bc7a0690861812ade523d19f82688ab819dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dbaab08c8677d598244d21afb7818e44e1c5d826",
          "url": "https://git.kernel.org/stable/c/dbaab08c8677d598244d21afb7818e44e1c5d826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fcbd2b336834bd24e1d9454ad5737856470c10d7",
          "url": "https://git.kernel.org/stable/c/fcbd2b336834bd24e1d9454ad5737856470c10d7"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50386",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix user-after-free\n\nThis uses l2cap_chan_hold_unless_zero() after calling\n__l2cap_get_chan_blah() to prevent the following trace:\n\nBluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref\n*kref)\nBluetooth: chan 0000000023c4974d\nBluetooth: parent 00000000ae861c08\n==================================================================\nBUG: KASAN: use-after-free in __mutex_waiter_is_first\nkernel/locking/mutex.c:191 [inline]\nBUG: KASAN: use-after-free in __mutex_lock_common\nkernel/locking/mutex.c:671 [inline]\nBUG: KASAN: use-after-free in __mutex_lock+0x278/0x400\nkernel/locking/mutex.c:729\nRead of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50386"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c108cf3ad386e0084277093b55a351c49e0be27",
          "url": "https://git.kernel.org/stable/c/0c108cf3ad386e0084277093b55a351c49e0be27"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11e40d6c0823f699d8ad501e48d1c3ae4be386cd",
          "url": "https://git.kernel.org/stable/c/11e40d6c0823f699d8ad501e48d1c3ae4be386cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/15fc21695eb606bdc5d483b92118ee42610a952d",
          "url": "https://git.kernel.org/stable/c/15fc21695eb606bdc5d483b92118ee42610a952d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f",
          "url": "https://git.kernel.org/stable/c/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ffde6e03085874ae22263ff4cef4869f797e84f",
          "url": "https://git.kernel.org/stable/c/6ffde6e03085874ae22263ff4cef4869f797e84f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45",
          "url": "https://git.kernel.org/stable/c/7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/843fc4e386dd84b806a7f07fb062d8c3a44e5364",
          "url": "https://git.kernel.org/stable/c/843fc4e386dd84b806a7f07fb062d8c3a44e5364"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1e894f950ad48897d1a7cb05909ea29d8c3810e",
          "url": "https://git.kernel.org/stable/c/d1e894f950ad48897d1a7cb05909ea29d8c3810e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d91fc2836562f299f34e361e089e9fe154da4f73",
          "url": "https://git.kernel.org/stable/c/d91fc2836562f299f34e361e089e9fe154da4f73"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52854",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix refcnt handling in padata_free_shell()\n\nIn a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead\nto system UAF (Use-After-Free) issues. Due to the lengthy analysis of\nthe pcrypt_aead01 function call, I'll describe the problem scenario\nusing a simplified model:\n\nSuppose there's a user of padata named `user_function` that adheres to\nthe padata requirement of calling `padata_free_shell` after `serial()`\nhas been invoked, as demonstrated in the following code:\n\n```c\nstruct request {\n    struct padata_priv padata;\n    struct completion *done;\n};\n\nvoid parallel(struct padata_priv *padata) {\n    do_something();\n}\n\nvoid serial(struct padata_priv *padata) {\n    struct request *request = container_of(padata,\n    \t\t\t\tstruct request,\n\t\t\t\tpadata);\n    complete(request->done);\n}\n\nvoid user_function() {\n    DECLARE_COMPLETION(done)\n    padata->parallel = parallel;\n    padata->serial = serial;\n    padata_do_parallel();\n    wait_for_completion(&done);\n    padata_free_shell();\n}\n```\n\nIn the corresponding padata.c file, there's the following code:\n\n```c\nstatic void padata_serial_worker(struct work_struct *serial_work) {\n    ...\n    cnt = 0;\n\n    while (!list_empty(&local_list)) {\n        ...\n        padata->serial(padata);\n        cnt++;\n    }\n\n    local_bh_enable();\n\n    if (refcount_sub_and_test(cnt, &pd->refcnt))\n        padata_free_pd(pd);\n}\n```\n\nBecause of the high system load and the accumulation of unexecuted\nsoftirq at this moment, `local_bh_enable()` in padata takes longer\nto execute than usual. Subsequently, when accessing `pd->refcnt`,\n`pd` has already been released by `padata_free_shell()`, resulting\nin a UAF issue with `pd->refcnt`.\n\nThe fix is straightforward: add `refcount_dec_and_test` before calling\n`padata_free_pd` in `padata_free_shell`.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52854"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5",
          "url": "https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b",
          "url": "https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f",
          "url": "https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d",
          "url": "https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f",
          "url": "https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275",
          "url": "https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50085",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev->raid_disks\nis greater than rs->raid_disks, so the loop touches one entry beyond\nthe allocated length.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50085"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a9faa704d83ff0b04387e385efd8ae21cd95af6",
          "url": "https://git.kernel.org/stable/c/2a9faa704d83ff0b04387e385efd8ae21cd95af6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3bfdc95466f5be4d8d95db5a5b470d61641a7c24",
          "url": "https://git.kernel.org/stable/c/3bfdc95466f5be4d8d95db5a5b470d61641a7c24"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/50235d9a1f1f742619ed9963cb9f240e5b821d46",
          "url": "https://git.kernel.org/stable/c/50235d9a1f1f742619ed9963cb9f240e5b821d46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71f601c779b3cc1baf497796f5b922c3fe5d2a1e",
          "url": "https://git.kernel.org/stable/c/71f601c779b3cc1baf497796f5b922c3fe5d2a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74af83732a39ab7d3bc9b49219a535853e25679f",
          "url": "https://git.kernel.org/stable/c/74af83732a39ab7d3bc9b49219a535853e25679f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dad24db59d2d2803576f2e3645728866a056dab",
          "url": "https://git.kernel.org/stable/c/7dad24db59d2d2803576f2e3645728866a056dab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2d47bef93fb74aa97d90f9a40ca657b8f376083",
          "url": "https://git.kernel.org/stable/c/c2d47bef93fb74aa97d90f9a40ca657b8f376083"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2f075e729636a44e98d9722e3852c2fa6fa49b6",
          "url": "https://git.kernel.org/stable/c/c2f075e729636a44e98d9722e3852c2fa6fa49b6"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49948",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49948"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285",
          "url": "https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db",
          "url": "https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f",
          "url": "https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb",
          "url": "https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a",
          "url": "https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc",
          "url": "https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e",
          "url": "https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e",
          "url": "https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:59:29.572832Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766617167"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}