{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "media: bttv: fix use after free error due to btv->timeout timer {CVE-2023-52847} {CVE-2023-52847}\n- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails {CVE-2022-50087} {CVE-2022-50087}\n- wifi: mwifiex: Fix OOB and integer underflow when rx packets {CVE-2023-53226} {CVE-2023-53226}\n- vsock: Fix transport_* TOCTOU {CVE-2025-38461} {CVE-2025-38461}\n- ALSA: usb-audio: Validate UAC3 cluster segment descriptors {CVE-2025-39757} {CVE-2025-39757}\n- locking/ww_mutex/test: Fix potential workqueue corruption {CVE-2023-52836} {CVE-2023-52836}\n- media: stk1160: fix bounds checking in stk1160_copy_video() {CVE-2024-38621} {CVE-2024-38621}\n- ath10k: skip ath10k_halt during suspend for driver state RESTARTING {CVE-2022-49519} {CVE-2022-49519}\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() {CVE-2022-48738} {CVE-2022-48738}\n- partitions: mac: fix handling of bogus partition table {CVE-2025-21772} {CVE-2025-21772}\n- ALSA: oss: Fix PCM OSS buffer allocation overflow {CVE-2022-49292} {CVE-2022-49292}\n- usb: cdc-acm: Check control transfer buffer size before access {CVE-2025-21704} {CVE-2025-21704}\n- vfio/pci: Properly hide first-in-list PCIe extended capability {CVE-2024-53214} {CVE-2024-53214}\n- ppdev: Add an error check in register_device {CVE-2024-36015} {CVE-2024-36015}\n- scsi: ses: Fix possible desc_ptr out-of-bounds accesses {CVE-2023-53675} {CVE-2023-53675}\n- enic: Validate length of nl attributes in enic_set_vf_port {CVE-2024-38659} {CVE-2024-38659}\n- dm array: fix releasing a faulty array block twice in dm_array_cursor_end {CVE-2024-57929} {CVE-2024-57929}\n- dlm: fix plock invalid read {CVE-2022-49407} {CVE-2022-49407}\n- rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev {CVE-2022-48759} {CVE-2022-48759}\n- bpf: Don't use tnum_range on array range checking for poke descriptors {CVE-2022-49985} {CVE-2022-49985}\n- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice {CVE-2025-38001} {CVE-2025-38001}\n- wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes {CVE-2023-53185} {CVE-2023-53185}\n- dm integrity: fix memory corruption when tag_size is less than digest size {CVE-2022-49044} {CVE-2022-49044}\n- drm/radeon: possible buffer overflow {CVE-2023-52867} {CVE-2023-52867}\n- ata: sata_dwc_460ex: Fix crash due to OOB write {CVE-2022-49073} {CVE-2022-49073}\n- fs/jfs: Add validity check for db_maxag and db_agpref {CVE-2023-52804} {CVE-2023-52804}\n- net/mlx5e: Check for NOT_READY flag state after locking {CVE-2023-53581} {CVE-2023-53581}\n- thermal: core: prevent potential string overflow {CVE-2023-52868} {CVE-2023-52868}\n- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data {CVE-2022-49145} {CVE-2022-49145}\n- efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare {CVE-2025-39817} {CVE-2025-39817}\n- igb: Fix potential invalid memory access in igb_init_module() {CVE-2024-52332} {CVE-2024-52332}\n- do_change_type(): refuse to operate on unmounted/not ours mounts {CVE-2025-38498} {CVE-2025-38498}\n- drm/amd/display: Skip finding free audio for unknown engine_id {CVE-2024-42119} {CVE-2024-42119}\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} {CVE-2022-50408}\n- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014} {CVE-2024-58014}\n- wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta {CVE-2023-53229} {CVE-2023-53229}\n- ovl: Filter invalid inodes with missing lookup function {CVE-2024-56570} {CVE-2024-56570}\n- net: usb: smsc75xx: Limit packet length to skb->len {CVE-2023-53125} {CVE-2023-53125}\n- net: stmmac: fix dma queue left shift overflow issue {CVE-2022-49592} {CVE-2022-49592}\n- iio: adc: at91: call input_free_device() on allocated iio_dev {CVE-2024-57904} {CVE-2024-57904}\n- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373} {CVE-2023-53373}\n- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718} {CVE-2025-38718}\n- KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 {CVE-2022-50228} {CVE-2022-50228}\n- soundwire: cadence: fix invalid PDI offset {CVE-2024-38635} {CVE-2024-38635}\n- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} {CVE-2023-53365}\n- ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans {CVE-2023-53034} {CVE-2023-53034}\n- Bluetooth: L2CAP: fix \"bad unlock balance\" in l2cap_disconnect_rsp {CVE-2023-53297} {CVE-2023-53297}\n- scsi: mpt3sas: Fix use-after-free warning {CVE-2022-48695} {CVE-2022-48695}\n- smb: client: fix use-after-free in cifs_oplock_break {CVE-2025-38527} {CVE-2025-38527}\n- NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() {CVE-2025-39730} {CVE-2025-39730}\n- scsi: lpfc: Fix buffer free/clear order in deferred receive path {CVE-2025-39841} {CVE-2025-39841}\n- Bluetooth: Fix potential use-after-free when clear keys {CVE-2023-53386} {CVE-2023-53386}\n- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322} {CVE-2023-53322}\n- ipv6: Fix out-of-bounds access in ipv6_find_tlv() {CVE-2023-53705} {CVE-2023-53705}\n- dma-buf/dma-resv: check if the new fence is really later {CVE-2022-49935} {CVE-2022-49935}\n- wifi: rtlwifi: remove unused check_buddy_priv {CVE-2024-58072} {CVE-2024-58072}\n- wifi: rtlwifi: remove unused dualmac control leftovers {CVE-2024-58072} {CVE-2024-58072}\n- wifi: rtlwifi: remove unused timer and related code {CVE-2024-58072} {CVE-2024-58072}\n- net: mdio: validate parameter addr in mdiobus_get_phy() {CVE-2023-53019} {CVE-2023-53019}\n- wifi: cfg80211: fix use-after-free in cmp_bss() {CVE-2025-39864} {CVE-2025-39864}\n- wifi: at76c50x: fix use after free access in at76_disconnect {CVE-2025-37796} {CVE-2025-37796}\n- ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() {CVE-2025-22121} {CVE-2025-22121}\n- ext4: move where set the MAY_INLINE_DATA flag is set {CVE-2025-22121} {CVE-2025-22121}\n- ext4: introduce ITAIL helper {CVE-2025-22121} {CVE-2025-22121}\n- ext4: improve xattr consistency checking and error reporting {CVE-2025-22121} {CVE-2025-22121}\n- net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789} {CVE-2025-37789}\n- mm: fix zswap writeback race condition {CVE-2023-53178} {CVE-2023-53178}\n- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-50367} {CVE-2022-50367}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos8.4els/advisories/2025/clsa-2025_1763731262.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763731262",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763731262"
      }
    ],
    "tracking": {
      "current_release_date": "2025-11-21T19:21:03Z",
      "generator": {
        "date": "2025-11-21T19:21:03Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1763731262",
      "initial_release_date": "2025-11-21T13:21:04Z",
      "revision_history": [
        {
          "date": "2025-11-21T13:21:04Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-11-21T19:21:03Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "kernel: Fix of 63 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 8.4",
                "product": {
                  "name": "Community Enterprise Operating System 8.4",
                  "product_id": "CentOS-8.4",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:8.4:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-modules-extra@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/python3-perf@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-modules-internal@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-modules@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-tools-libs-devel@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-core@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/bpftool@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-modules@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-core@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-modules-extra@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-devel@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-devel@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-modules-internal@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-tools@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-tools-libs@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-selftests-internal@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-cross-headers@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-ipaclones-internal@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-headers@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_id": "perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/perf@4.18.0-305.25.1.el8_4.tuxcare.els32?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64 as a component of Community Enterprise Operating System 8.4",
          "product_id": "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
        "relates_to_product_reference": "CentOS-8.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-49592",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: stmmac: fix dma queue left shift overflow issue\n\nWhen queue number is > 4, left shift overflows due to 32 bits\ninteger variable. Mask calculation is wrong for MTL_RXQ_DMA_MAP1.\n\nIf CONFIG_UBSAN is enabled, kernel dumps below warning:\n[   10.363842] ==================================================================\n[   10.363882] UBSAN: shift-out-of-bounds in /build/linux-intel-iotg-5.15-8e6Tf4/\nlinux-intel-iotg-5.15-5.15.0/drivers/net/ethernet/stmicro/stmmac/dwmac4_core.c:224:12\n[   10.363929] shift exponent 40 is too large for 32-bit type 'unsigned int'\n[   10.363953] CPU: 1 PID: 599 Comm: NetworkManager Not tainted 5.15.0-1003-intel-iotg\n[   10.363956] Hardware name: ADLINK Technology Inc. LEC-EL/LEC-EL, BIOS 0.15.11 12/22/2021\n[   10.363958] Call Trace:\n[   10.363960]  <TASK>\n[   10.363963]  dump_stack_lvl+0x4a/0x5f\n[   10.363971]  dump_stack+0x10/0x12\n[   10.363974]  ubsan_epilogue+0x9/0x45\n[   10.363976]  __ubsan_handle_shift_out_of_bounds.cold+0x61/0x10e\n[   10.363979]  ? wake_up_klogd+0x4a/0x50\n[   10.363983]  ? vprintk_emit+0x8f/0x240\n[   10.363986]  dwmac4_map_mtl_dma.cold+0x42/0x91 [stmmac]\n[   10.364001]  stmmac_mtl_configuration+0x1ce/0x7a0 [stmmac]\n[   10.364009]  ? dwmac410_dma_init_channel+0x70/0x70 [stmmac]\n[   10.364020]  stmmac_hw_setup.cold+0xf/0xb14 [stmmac]\n[   10.364030]  ? page_pool_alloc_pages+0x4d/0x70\n[   10.364034]  ? stmmac_clear_tx_descriptors+0x6e/0xe0 [stmmac]\n[   10.364042]  stmmac_open+0x39e/0x920 [stmmac]\n[   10.364050]  __dev_open+0xf0/0x1a0\n[   10.364054]  __dev_change_flags+0x188/0x1f0\n[   10.364057]  dev_change_flags+0x26/0x60\n[   10.364059]  do_setlink+0x908/0xc40\n[   10.364062]  ? do_setlink+0xb10/0xc40\n[   10.364064]  ? __nla_validate_parse+0x4c/0x1a0\n[   10.364068]  __rtnl_newlink+0x597/0xa10\n[   10.364072]  ? __nla_reserve+0x41/0x50\n[   10.364074]  ? __kmalloc_node_track_caller+0x1d0/0x4d0\n[   10.364079]  ? pskb_expand_head+0x75/0x310\n[   10.364082]  ? nla_reserve_64bit+0x21/0x40\n[   10.364086]  ? skb_free_head+0x65/0x80\n[   10.364089]  ? security_sock_rcv_skb+0x2c/0x50\n[   10.364094]  ? __cond_resched+0x19/0x30\n[   10.364097]  ? kmem_cache_alloc_trace+0x15a/0x420\n[   10.364100]  rtnl_newlink+0x49/0x70\n\nThis change fixes MTL_RXQ_DMA_MAP1 mask issue and channel/queue\nmapping warning.\n\nBugLink: https://bugzilla.kernel.org/show_bug.cgi?id=216195",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49592"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/508d86ead36cbd8dfb60773a33276790d668c473",
          "url": "https://git.kernel.org/stable/c/508d86ead36cbd8dfb60773a33276790d668c473"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/573768dede0e2b7de38ecbc11cb3ee47643902dc",
          "url": "https://git.kernel.org/stable/c/573768dede0e2b7de38ecbc11cb3ee47643902dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/613b065ca32e90209024ec4a6bb5ca887ee70980",
          "url": "https://git.kernel.org/stable/c/613b065ca32e90209024ec4a6bb5ca887ee70980"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c687a893f5cae5ca40d189635602e93af9bab73",
          "url": "https://git.kernel.org/stable/c/7c687a893f5cae5ca40d189635602e93af9bab73"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3ac79f38d354b10925824899cdbd2caadce55ba",
          "url": "https://git.kernel.org/stable/c/a3ac79f38d354b10925824899cdbd2caadce55ba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad2febdfbd01e1d092a08bfdba92ede79ea05ff3",
          "url": "https://git.kernel.org/stable/c/ad2febdfbd01e1d092a08bfdba92ede79ea05ff3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e846bde09677fa3b203057846620b7ed96540f5f",
          "url": "https://git.kernel.org/stable/c/e846bde09677fa3b203057846620b7ed96540f5f"
        }
      ],
      "release_date": "2025-02-26T07:01:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53178",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmm: fix zswap writeback race condition\nThe zswap writeback mechanism can cause a race condition resulting in\nmemory corruption, where a swapped out page gets swapped in with data that\nwas written to a different page.\nThe race unfolds like this:\n1. a page with data A and swap offset X is stored in zswap\n2. page A is removed off the LRU by zpool driver for writeback in\nzswap-shrink work, data for A is mapped by zpool driver\n3. user space program faults and invalidates page entry A, offset X is\nconsidered free\n4. kswapd stores page B at offset X in zswap (zswap could also be\nfull, if so, page B would then be IOed to X, then skip step 5.)\n5. entry A is replaced by B in tree->rbroot, this doesn't affect the\nlocal reference held by zswap-shrink work\n6. zswap-shrink work writes back A at X, and frees zswap entry A\n7. swapin of slot X brings A in memory instead of B\nThe fix:\nOnce the swap page cache has been allocated (case ZSWAP_SWAPCACHE_NEW),\nzswap-shrink work just checks that the local zswap_entry reference is\nstill the same as the one in the tree.  If it's not the same it means that\nit's either been invalidated or replaced, in both cases the writeback is\naborted because the local entry contains stale data.\nReproducer:\nI originally found this by running `stress` overnight to validate my work\non the zswap writeback mechanism, it manifested after hours on my test\nmachine.  The key to make it happen is having zswap writebacks, so\nwhatever setup pumps /sys/kernel/debug/zswap/written_back_pages should do\nthe trick.\nIn order to reproduce this faster on a vm, I setup a system with ~100M of\navailable memory and a 500M swap file, then running `stress --vm 1\n--vm-bytes 300000000 --vm-stride 4000` makes it happen in matter of tens\nof minutes.  One can speed things up even more by swinging\n/sys/module/zswap/parameters/max_pool_percent up and down between, say, 20\nand 1; this makes it reproduce in tens of seconds.  It's crucial to set\n`--vm-stride` to something other than 4096 otherwise `stress` won't\nrealize that memory has been corrupted because all pages would have the\nsame data.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53178"
        }
      ],
      "release_date": "2025-09-15T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53019",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: validate parameter addr in mdiobus_get_phy()\n\nThe caller may pass any value as addr, what may result in an out-of-bounds\naccess to array mdio_map. One existing case is stmmac_init_phy() that\nmay pass -1 as addr. Therefore validate addr before using it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53019"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d80c259dfbadefa61b7ea334dfce5cb57f8c72f",
          "url": "https://git.kernel.org/stable/c/1d80c259dfbadefa61b7ea334dfce5cb57f8c72f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bc5f1f6bc94e695dfd912122af96e7115a0ddb8",
          "url": "https://git.kernel.org/stable/c/4bc5f1f6bc94e695dfd912122af96e7115a0ddb8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7879626296e6ffd838ae0f2af1ab49ee46354973",
          "url": "https://git.kernel.org/stable/c/7879626296e6ffd838ae0f2af1ab49ee46354973"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/867dbe784c5010a466f00a7d1467c1c5ea569c75",
          "url": "https://git.kernel.org/stable/c/867dbe784c5010a466f00a7d1467c1c5ea569c75"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a7b9560a3a8eb8724888c426e05926752f73aa0",
          "url": "https://git.kernel.org/stable/c/8a7b9560a3a8eb8724888c426e05926752f73aa0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad67de330d83e8078372b52af18ffe8d39e26c85",
          "url": "https://git.kernel.org/stable/c/ad67de330d83e8078372b52af18ffe8d39e26c85"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c431a3d642593bbdb99e8a9e3eed608b730db6f8",
          "url": "https://git.kernel.org/stable/c/c431a3d642593bbdb99e8a9e3eed608b730db6f8"
        }
      ],
      "release_date": "2025-03-27T17:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53034",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans\n\nThere is a kernel API ntb_mw_clear_trans() would pass 0 to both addr and\nsize. This would make xlate_pos negative.\n\n[   23.734156] switchtec switchtec0: MW 0: part 0 addr 0x0000000000000000 size 0x0000000000000000\n[   23.734158] ================================================================================\n[   23.734172] UBSAN: shift-out-of-bounds in drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7\n[   23.734418] shift exponent -1 is negative\n\nEnsuring xlate_pos is a positive or zero before BIT.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53034"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0df2e03e4620548b41891b4e0d1bd9d2e0d8a39a",
          "url": "https://git.kernel.org/stable/c/0df2e03e4620548b41891b4e0d1bd9d2e0d8a39a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2429bdf26a0f3950fdd996861e9c1a3873af1dbe",
          "url": "https://git.kernel.org/stable/c/2429bdf26a0f3950fdd996861e9c1a3873af1dbe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36d32cfb00d42e865396424bb5d340fc0a28870d",
          "url": "https://git.kernel.org/stable/c/36d32cfb00d42e865396424bb5d340fc0a28870d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b6857bb3bfb0dae17fab1e42c1e82c204a508b1",
          "url": "https://git.kernel.org/stable/c/5b6857bb3bfb0dae17fab1e42c1e82c204a508b1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ed22f8d8be26225a78cf5e85b2036421a6bf2d5",
          "url": "https://git.kernel.org/stable/c/7ed22f8d8be26225a78cf5e85b2036421a6bf2d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c61a3f2df162ba424be0141649a9ef5f28eaccc1",
          "url": "https://git.kernel.org/stable/c/c61a3f2df162ba424be0141649a9ef5f28eaccc1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb153bdc1812a3375639ed6ca5f147eaefb65349",
          "url": "https://git.kernel.org/stable/c/cb153bdc1812a3375639ed6ca5f147eaefb65349"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de203da734fae00e75be50220ba5391e7beecdf9",
          "url": "https://git.kernel.org/stable/c/de203da734fae00e75be50220ba5391e7beecdf9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f56951f211f181410a383d305e8d370993e45294",
          "url": "https://git.kernel.org/stable/c/f56951f211f181410a383d305e8d370993e45294"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-04-16T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-58014",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()\n\nIn 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN()\ninstead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access.\nCompile tested only.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-58014"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/093286c33409bf38896f2dab0c0bb6ca388afb33",
          "url": "https://git.kernel.org/stable/c/093286c33409bf38896f2dab0c0bb6ca388afb33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a457223cb2b9ca46bae7de387d0f4c093b0220d",
          "url": "https://git.kernel.org/stable/c/0a457223cb2b9ca46bae7de387d0f4c093b0220d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13ef16c4fe384b1e70277bbe1d87934ee6c81e12",
          "url": "https://git.kernel.org/stable/c/13ef16c4fe384b1e70277bbe1d87934ee6c81e12"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f4a0948c3524ae50f166dbc6572a3296b014e62",
          "url": "https://git.kernel.org/stable/c/3f4a0948c3524ae50f166dbc6572a3296b014e62"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f6e293246dc1f5b2b6b3d0f2d757598489cda79",
          "url": "https://git.kernel.org/stable/c/6f6e293246dc1f5b2b6b3d0f2d757598489cda79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ada9df08b3ef683507e75b92f522fb659260147f",
          "url": "https://git.kernel.org/stable/c/ada9df08b3ef683507e75b92f522fb659260147f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c27ce584d274f6ad3cba2294497de824a3c66646",
          "url": "https://git.kernel.org/stable/c/c27ce584d274f6ad3cba2294497de824a3c66646"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d280a12e9b87819a8a209639d600b48a2d6d65dc",
          "url": "https://git.kernel.org/stable/c/d280a12e9b87819a8a209639d600b48a2d6d65dc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-02-27T03:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-21772",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n   preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n   (which results in partition table entries straddling sector boundaries),\n   bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n   termination - use strnlen() and strncmp() instead of strlen() and\n   strcmp().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/213ba5bd81b7e97ac6e6190b8f3bc6ba76123625",
          "url": "https://git.kernel.org/stable/c/213ba5bd81b7e97ac6e6190b8f3bc6ba76123625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27a39d006f85e869be68c1d5d2ce05e5d6445bf5",
          "url": "https://git.kernel.org/stable/c/27a39d006f85e869be68c1d5d2ce05e5d6445bf5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40a35d14f3c0dc72b689061ec72fc9b193f37d1f",
          "url": "https://git.kernel.org/stable/c/40a35d14f3c0dc72b689061ec72fc9b193f37d1f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6578717ebca91678131d2b1f4ba4258e60536e9f",
          "url": "https://git.kernel.org/stable/c/6578717ebca91678131d2b1f4ba4258e60536e9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fa9706722882f634090bfc9af642bf9ed719e27",
          "url": "https://git.kernel.org/stable/c/7fa9706722882f634090bfc9af642bf9ed719e27"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/80e648042e512d5a767da251d44132553fe04ae0",
          "url": "https://git.kernel.org/stable/c/80e648042e512d5a767da251d44132553fe04ae0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/92527100be38ede924768f4277450dfe8a40e16b",
          "url": "https://git.kernel.org/stable/c/92527100be38ede924768f4277450dfe8a40e16b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3e77da9f843e4ab93917d30c314f0283e28c124",
          "url": "https://git.kernel.org/stable/c/a3e77da9f843e4ab93917d30c314f0283e28c124"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-02-27T03:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-58072",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: remove unused check_buddy_priv\n\nCommit 2461c7d60f9f (\"rtlwifi: Update header file\") introduced a global\nlist of private data structures.\n\nLater on, commit 26634c4b1868 (\"rtlwifi Modify existing bits to match\nvendor version 2013.02.07\") started adding the private data to that list at\nprobe time and added a hook, check_buddy_priv to find the private data from\na similar device.\n\nHowever, that function was never used.\n\nBesides, though there is a lock for that list, it is never used. And when\nthe probe fails, the private data is never removed from the list. This\nwould cause a second probe to access freed memory.\n\nRemove the unused hook, structures and members, which will prevent the\npotential race condition on the list and its corruption during a second\nprobe when probe fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-58072"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/006e803af7408c3fc815b0654fc5ab43d34f0154",
          "url": "https://git.kernel.org/stable/c/006e803af7408c3fc815b0654fc5ab43d34f0154"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b9cbd8a9ae68b32099fbb03b2d5ffa0c5e0dcc9",
          "url": "https://git.kernel.org/stable/c/1b9cbd8a9ae68b32099fbb03b2d5ffa0c5e0dcc9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e39b0486cdb496cdfba3bc89886150e46acf6f4",
          "url": "https://git.kernel.org/stable/c/1e39b0486cdb496cdfba3bc89886150e46acf6f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fdac64c3c35858aa8ac5caa70b232e03456e120",
          "url": "https://git.kernel.org/stable/c/2fdac64c3c35858aa8ac5caa70b232e03456e120"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/465d01ef6962b82b1f0ad1f3e58b398dbd35c1c1",
          "url": "https://git.kernel.org/stable/c/465d01ef6962b82b1f0ad1f3e58b398dbd35c1c1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/543e3e9f2e9e47ded774c74e680f28a0ca362aee",
          "url": "https://git.kernel.org/stable/c/543e3e9f2e9e47ded774c74e680f28a0ca362aee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e2fcc68fbaab3ad9f5671fee2be0956134b740a",
          "url": "https://git.kernel.org/stable/c/8e2fcc68fbaab3ad9f5671fee2be0956134b740a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f801e754efa21bd61b3cc15ec7565696165b272f",
          "url": "https://git.kernel.org/stable/c/f801e754efa21bd61b3cc15ec7565696165b272f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-03-06T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53705",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nipv6: Fix out-of-bounds access in ipv6_find_tlv()\noptlen is fetched without checking whether there is more than one byte to parse.\nIt can lead to out-of-bounds access.\nFound by InfoTeCS on behalf of Linux Verification Center\n(linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53705"
        }
      ],
      "release_date": "2025-10-22T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53297",
      "cwe": {
        "id": "CWE-832",
        "name": "Unlock of a Resource that is not Locked"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nBluetooth: L2CAP: fix \"bad unlock balance\" in l2cap_disconnect_rsp\nconn->chan_lock isn't acquired before l2cap_get_chan_by_scid,\nif l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance'\nis triggered.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53297"
        }
      ],
      "release_date": "2025-09-16T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50408",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nwifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()\n> ret = brcmf_proto_tx_queue_data(drvr, ifp->ifidx, skb);\nmay be schedule, and then complete before the line\n> ndev->stats.tx_bytes += skb->len;\n[   46.912801] ==================================================================\n[   46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328\n[   46.935991]\n[   46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G           O      5.4.199-[REDACTED] #1\n[   46.947255] Hardware name: [REDACTED]\n[   46.954568] Call trace:\n[   46.957037]  dump_backtrace+0x0/0x2b8\n[   46.960719]  show_stack+0x24/0x30\n[   46.964052]  dump_stack+0x128/0x194\n[   46.967557]  print_address_description.isra.0+0x64/0x380\n[   46.972877]  __kasan_report+0x1d4/0x240\n[   46.976723]  kasan_report+0xc/0x18\n[   46.980138]  __asan_report_load4_noabort+0x18/0x20\n[   46.985027]  brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.990613]  dev_hard_start_xmit+0x1bc/0xda0\n[   46.994894]  sch_direct_xmit+0x198/0xd08\n[   46.998827]  __qdisc_run+0x37c/0x1dc0\n[   47.002500]  __dev_queue_xmit+0x1528/0x21f8\n[   47.006692]  dev_queue_xmit+0x24/0x30\n[   47.010366]  neigh_resolve_output+0x37c/0x678\n[   47.014734]  ip_finish_output2+0x598/0x2458\n[   47.018927]  __ip_finish_output+0x300/0x730\n[   47.023118]  ip_output+0x2e0/0x430\n[   47.026530]  ip_local_out+0x90/0x140\n[   47.030117]  igmpv3_sendpack+0x14c/0x228\n[   47.034049]  igmpv3_send_cr+0x384/0x6b8\n[   47.037895]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.042262]  call_timer_fn+0x1cc/0xbe8\n[   47.046021]  __run_timers+0x4d8/0xb28\n[   47.049693]  run_timer_softirq+0x24/0x40\n[   47.053626]  __do_softirq+0x2c0/0x117c\n[   47.057387]  irq_exit+0x2dc/0x388\n[   47.060715]  __handle_domain_irq+0xb4/0x158\n[   47.064908]  gic_handle_irq+0x58/0xb0\n[   47.068581]  el0_irq_naked+0x50/0x5c\n[   47.072162]\n[   47.073665] Allocated by task 328:\n[   47.077083]  save_stack+0x24/0xb0\n[   47.080410]  __kasan_kmalloc.isra.0+0xc0/0xe0\n[   47.084776]  kasan_slab_alloc+0x14/0x20\n[   47.088622]  kmem_cache_alloc+0x15c/0x468\n[   47.092643]  __alloc_skb+0xa4/0x498\n[   47.096142]  igmpv3_newpack+0x158/0xd78\n[   47.099987]  add_grhead+0x210/0x288\n[   47.103485]  add_grec+0x6b0/0xb70\n[   47.106811]  igmpv3_send_cr+0x2e0/0x6b8\n[   47.110657]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.115027]  call_timer_fn+0x1cc/0xbe8\n[   47.118785]  __run_timers+0x4d8/0xb28\n[   47.122457]  run_timer_softirq+0x24/0x40\n[   47.126389]  __do_softirq+0x2c0/0x117c\n[   47.130142]\n[   47.131643] Freed by task 180:\n[   47.134712]  save_stack+0x24/0xb0\n[   47.138041]  __kasan_slab_free+0x108/0x180\n[   47.142146]  kasan_slab_free+0x10/0x18\n[   47.145904]  slab_free_freelist_hook+0xa4/0x1b0\n[   47.150444]  kmem_cache_free+0x8c/0x528\n[   47.154292]  kfree_skbmem+0x94/0x108\n[   47.157880]  consume_skb+0x10c/0x5a8\n[   47.161466]  __dev_kfree_skb_any+0x88/0xa0\n[   47.165598]  brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]\n[   47.171023]  brcmf_txfinalize+0xec/0x190 [brcmfmac]\n[   47.176016]  brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]\n[   47.182056]  brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]\n[   47.187568]  brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]\n[   47.192529]  brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]\n[   47.197859]  process_one_work+0x7fc/0x1a80\n[   47.201965]  worker_thread+0x31c/0xc40\n[   47.205726]  kthread+0x2d8/0x370\n[   47.208967]  ret_from_fork+0x10/0x18\n[   47.212546]\n[   47.214051] The buggy address belongs to the object at ffffff803f588280\n[   47.214051]  which belongs to the cache skbuff_head_cache of size 208\n[   47.227086] The buggy address is located 104 bytes inside of\n[   47.227086]  208-byte region [ffffff803f588280, ffffff803f588350)\n[   47.238814] The buggy address belongs to the page:\n[   47.243618] page:ffffffff00dd6200 refcount:1 mapcou\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50408"
        }
      ],
      "release_date": "2025-09-18T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-53214",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the 'Next\nCapability Offset' field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device->pci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n <TASK>\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-53214"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/06f2fcf49854ad05a09d09e0dbee6544fff04695",
          "url": "https://git.kernel.org/stable/c/06f2fcf49854ad05a09d09e0dbee6544fff04695"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0918f5643fc6c3f7801f4a22397d2cc09ba99207",
          "url": "https://git.kernel.org/stable/c/0918f5643fc6c3f7801f4a22397d2cc09ba99207"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1ef195178fb552478eb2587df4ad3be14ef76507",
          "url": "https://git.kernel.org/stable/c/1ef195178fb552478eb2587df4ad3be14ef76507"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4464e5aa3aa4574063640f1082f7d7e323af8eb4",
          "url": "https://git.kernel.org/stable/c/4464e5aa3aa4574063640f1082f7d7e323af8eb4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6c6502d944168cbd7e03a4a08ad6488f78d73485",
          "url": "https://git.kernel.org/stable/c/6c6502d944168cbd7e03a4a08ad6488f78d73485"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d121f66b67921fb3b95e0ea9856bfba53733e91",
          "url": "https://git.kernel.org/stable/c/7d121f66b67921fb3b95e0ea9856bfba53733e91"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/949bee8065a85a5c6607c624dc05b5bc17119699",
          "url": "https://git.kernel.org/stable/c/949bee8065a85a5c6607c624dc05b5bc17119699"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9567bd34aa3b986736c290c5bcba47e0182ac47a",
          "url": "https://git.kernel.org/stable/c/9567bd34aa3b986736c290c5bcba47e0182ac47a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe4bf8d0b6716a423b16495d55b35d3fe515905d",
          "url": "https://git.kernel.org/stable/c/fe4bf8d0b6716a423b16495d55b35d3fe515905d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
        }
      ],
      "release_date": "2024-12-27T14:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-57929",
      "cwe": {
        "id": "CWE-672",
        "name": "Operation on a Resource after Expiration or Release"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm array: fix releasing a faulty array block twice in dm_array_cursor_end\n\nWhen dm_bm_read_lock() fails due to locking or checksum errors, it\nreleases the faulty block implicitly while leaving an invalid output\npointer behind. The caller of dm_bm_read_lock() should not operate on\nthis invalid dm_block pointer, or it will lead to undefined result.\nFor example, the dm_array_cursor incorrectly caches the invalid pointer\non reading a faulty array block, causing a double release in\ndm_array_cursor_end(), then hitting the BUG_ON in dm-bufio cache_put().\n\nReproduce steps:\n\n1. initialize a cache device\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc $262144\"\ndd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1\ndmsetup create cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\n\n2. wipe the second array block offline\n\ndmsteup remove cache cmeta cdata corig\nmapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \\\n2>/dev/null | hexdump -e '1/8 \"%u\\n\"')\nablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \\\n2>/dev/null | hexdump -e '1/8 \"%u\\n\"')\ndd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock\n\n3. try reopen the cache device\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc $262144\"\ndmsetup create cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\n\nKernel logs:\n\n(snip)\ndevice-mapper: array: array_block_check failed: blocknr 0 != wanted 10\ndevice-mapper: block manager: array validator check failed for block 10\ndevice-mapper: array: get_ablock failed\ndevice-mapper: cache metadata: dm_array_cursor_next for mapping failed\n------------[ cut here ]------------\nkernel BUG at drivers/md/dm-bufio.c:638!\n\nFix by setting the cached block pointer to NULL on errors.\n\nIn addition to the reproducer described above, this fix can be\nverified using the \"array_cursor/damaged\" test in dm-unit:\n  dm-unit run /pdata/array_cursor/damaged --kernel-dir <KERNEL_DIR>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-57929"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/017c4470bff53585370028fec9341247bad358ff",
          "url": "https://git.kernel.org/stable/c/017c4470bff53585370028fec9341247bad358ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6002bec5354f86d1a2df21468f68e3ec03ede9da",
          "url": "https://git.kernel.org/stable/c/6002bec5354f86d1a2df21468f68e3ec03ede9da"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/738994872d77e189b2d13c501a1d145e95d98f46",
          "url": "https://git.kernel.org/stable/c/738994872d77e189b2d13c501a1d145e95d98f46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c7c03d0e926762adf3a3a0ba86156fb5e19538b",
          "url": "https://git.kernel.org/stable/c/9c7c03d0e926762adf3a3a0ba86156fb5e19538b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e477021d252c007f0c6d45b5d13d341efed03979",
          "url": "https://git.kernel.org/stable/c/e477021d252c007f0c6d45b5d13d341efed03979"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f2893c0804d86230ffb8f1c8703fdbb18648abc8",
          "url": "https://git.kernel.org/stable/c/f2893c0804d86230ffb8f1c8703fdbb18648abc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc1ef07c3522e257e32702954f265debbcb096a7",
          "url": "https://git.kernel.org/stable/c/fc1ef07c3522e257e32702954f265debbcb096a7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
        }
      ],
      "release_date": "2025-01-19T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49407",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndlm: fix plock invalid read\n\nThis patch fixes an invalid read showed by KASAN. A unlock will allocate a\n\"struct plock_op\" and a followed send_op() will append it to a global\nsend_list data structure. In some cases a followed dev_read() moves it\nto recv_list and dev_write() will cast it to \"struct plock_xop\" and access\nfields which are only available in those structures. At this point an\ninvalid read happens by accessing those fields.\n\nTo fix this issue the \"callback\" field is moved to \"struct plock_op\" to\nindicate that a cast to \"plock_xop\" is allowed and does the additional\n\"plock_xop\" handling if set.\n\nExample of the KASAN output which showed the invalid read:\n\n[ 2064.296453] ==================================================================\n[ 2064.304852] BUG: KASAN: slab-out-of-bounds in dev_write+0x52b/0x5a0 [dlm]\n[ 2064.306491] Read of size 8 at addr ffff88800ef227d8 by task dlm_controld/7484\n[ 2064.308168]\n[ 2064.308575] CPU: 0 PID: 7484 Comm: dlm_controld Kdump: loaded Not tainted 5.14.0+ #9\n[ 2064.310292] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\n[ 2064.311618] Call Trace:\n[ 2064.312218]  dump_stack_lvl+0x56/0x7b\n[ 2064.313150]  print_address_description.constprop.8+0x21/0x150\n[ 2064.314578]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.315610]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.316595]  kasan_report.cold.14+0x7f/0x11b\n[ 2064.317674]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.318687]  dev_write+0x52b/0x5a0 [dlm]\n[ 2064.319629]  ? dev_read+0x4a0/0x4a0 [dlm]\n[ 2064.320713]  ? bpf_lsm_kernfs_init_security+0x10/0x10\n[ 2064.321926]  vfs_write+0x17e/0x930\n[ 2064.322769]  ? __fget_light+0x1aa/0x220\n[ 2064.323753]  ksys_write+0xf1/0x1c0\n[ 2064.324548]  ? __ia32_sys_read+0xb0/0xb0\n[ 2064.325464]  do_syscall_64+0x3a/0x80\n[ 2064.326387]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 2064.327606] RIP: 0033:0x7f807e4ba96f\n[ 2064.328470] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 39 87 f8 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 7c 87 f8 ff 48\n[ 2064.332902] RSP: 002b:00007ffd50cfe6e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\n[ 2064.334658] RAX: ffffffffffffffda RBX: 000055cc3886eb30 RCX: 00007f807e4ba96f\n[ 2064.336275] RDX: 0000000000000040 RSI: 00007ffd50cfe7e0 RDI: 0000000000000010\n[ 2064.337980] RBP: 00007ffd50cfe7e0 R08: 0000000000000000 R09: 0000000000000001\n[ 2064.339560] R10: 000055cc3886eb30 R11: 0000000000000293 R12: 000055cc3886eb80\n[ 2064.341237] R13: 000055cc3886eb00 R14: 000055cc3886f590 R15: 0000000000000001\n[ 2064.342857]\n[ 2064.343226] Allocated by task 12438:\n[ 2064.344057]  kasan_save_stack+0x1c/0x40\n[ 2064.345079]  __kasan_kmalloc+0x84/0xa0\n[ 2064.345933]  kmem_cache_alloc_trace+0x13b/0x220\n[ 2064.346953]  dlm_posix_unlock+0xec/0x720 [dlm]\n[ 2064.348811]  do_lock_file_wait.part.32+0xca/0x1d0\n[ 2064.351070]  fcntl_setlk+0x281/0xbc0\n[ 2064.352879]  do_fcntl+0x5e4/0xfe0\n[ 2064.354657]  __x64_sys_fcntl+0x11f/0x170\n[ 2064.356550]  do_syscall_64+0x3a/0x80\n[ 2064.358259]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 2064.360745]\n[ 2064.361511] Last potentially related work creation:\n[ 2064.363957]  kasan_save_stack+0x1c/0x40\n[ 2064.365811]  __kasan_record_aux_stack+0xaf/0xc0\n[ 2064.368100]  call_rcu+0x11b/0xf70\n[ 2064.369785]  dlm_process_incoming_buffer+0x47d/0xfd0 [dlm]\n[ 2064.372404]  receive_from_sock+0x290/0x770 [dlm]\n[ 2064.374607]  process_recv_sockets+0x32/0x40 [dlm]\n[ 2064.377290]  process_one_work+0x9a8/0x16e0\n[ 2064.379357]  worker_thread+0x87/0xbf0\n[ 2064.381188]  kthread+0x3ac/0x490\n[ 2064.383460]  ret_from_fork+0x22/0x30\n[ 2064.385588]\n[ 2064.386518] Second to last potentially related work creation:\n[ 2064.389219]  kasan_save_stack+0x1c/0x40\n[ 2064.391043]  __kasan_record_aux_stack+0xaf/0xc0\n[ 2064.393303]  call_rcu+0x11b/0xf70\n[ 2064.394885]  dlm_process_incoming_buffer+0x47d/0xfd0 [dlm]\n[ 2064.397694]  receive_from_sock+0x290/0x770 \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49407"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2c55155cc365861044d9e6e80e342693e8805e33",
          "url": "https://git.kernel.org/stable/c/2c55155cc365861044d9e6e80e342693e8805e33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/42252d0d2aa9b94d168241710a761588b3959019",
          "url": "https://git.kernel.org/stable/c/42252d0d2aa9b94d168241710a761588b3959019"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49cd9eb7b9a7b88124b31e31f8e539acaf1b3a6d",
          "url": "https://git.kernel.org/stable/c/49cd9eb7b9a7b88124b31e31f8e539acaf1b3a6d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56aa8d1fbd02357f3bf81bdfba1cde87ce8402fc",
          "url": "https://git.kernel.org/stable/c/56aa8d1fbd02357f3bf81bdfba1cde87ce8402fc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a1765adf9855cf0f6d3f7e0eb4b78ca66f70dee",
          "url": "https://git.kernel.org/stable/c/5a1765adf9855cf0f6d3f7e0eb4b78ca66f70dee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72f2f68970f9bdc252d59e119b385a6441b0b155",
          "url": "https://git.kernel.org/stable/c/72f2f68970f9bdc252d59e119b385a6441b0b155"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/899bc4429174861122f0c236588700a4710c1fec",
          "url": "https://git.kernel.org/stable/c/899bc4429174861122f0c236588700a4710c1fec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/acdad5bc9827922ec2f2e84fd198718aa8e8ab92",
          "url": "https://git.kernel.org/stable/c/acdad5bc9827922ec2f2e84fd198718aa8e8ab92"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e421872fa17542cf33747071fb141b0130ce9ef7",
          "url": "https://git.kernel.org/stable/c/e421872fa17542cf33747071fb141b0130ce9ef7"
        }
      ],
      "release_date": "2025-02-26T07:01:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-42119",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Skip finding free audio for unknown engine_id\n\n[WHY]\nENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it\nalso means it is uninitialized and does not need free audio.\n\n[HOW]\nSkip and return NULL.\n\nThis fixes 2 OVERRUN issues reported by Coverity.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-42119"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1357b2165d9ad94faa4c4a20d5e2ce29c2ff29c3",
          "url": "https://git.kernel.org/stable/c/1357b2165d9ad94faa4c4a20d5e2ce29c2ff29c3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/874261358d31fc772f2823604167e670983cc1ca",
          "url": "https://git.kernel.org/stable/c/874261358d31fc772f2823604167e670983cc1ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/881fb6afc0004c5e6392ae2848f825bf051dae14",
          "url": "https://git.kernel.org/stable/c/881fb6afc0004c5e6392ae2848f825bf051dae14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/95ad20ee3c4efbb91f9a4ab08e070aa3697f5879",
          "url": "https://git.kernel.org/stable/c/95ad20ee3c4efbb91f9a4ab08e070aa3697f5879"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9eb4db08a808e3a3ba59193aeb84a57a6dc4d8c9",
          "url": "https://git.kernel.org/stable/c/9eb4db08a808e3a3ba59193aeb84a57a6dc4d8c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/afaaebdee9bb9f26d9e13cc34b33bd0a7bf59488",
          "url": "https://git.kernel.org/stable/c/afaaebdee9bb9f26d9e13cc34b33bd0a7bf59488"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eacca028a623f608607d02457122ee5284491e18",
          "url": "https://git.kernel.org/stable/c/eacca028a623f608607d02457122ee5284491e18"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ffa7bd3ca9cfa902b857d1dc9a5f46fededf86c8",
          "url": "https://git.kernel.org/stable/c/ffa7bd3ca9cfa902b857d1dc9a5f46fededf86c8"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-07-30T08:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49044",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm integrity: fix memory corruption when tag_size is less than digest size\n\nIt is possible to set up dm-integrity in such a way that the\n\"tag_size\" parameter is less than the actual digest size. In this\nsituation, a part of the digest beyond tag_size is ignored.\n\nIn this case, dm-integrity would write beyond the end of the\nic->recalc_tags array and corrupt memory. The corruption happened in\nintegrity_recalc->integrity_sector_checksum->crypto_shash_final.\n\nFix this corruption by increasing the tags array so that it has enough\npadding at the end to accomodate the loop in integrity_recalc() being\nable to write a full digest size for the last member of the tags\narray.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49044"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/08c1af8f1c13bbf210f1760132f4df24d0ed46d6",
          "url": "https://git.kernel.org/stable/c/08c1af8f1c13bbf210f1760132f4df24d0ed46d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4d485cf9b609709e45d5113e6e2b1b01254b2fe9",
          "url": "https://git.kernel.org/stable/c/4d485cf9b609709e45d5113e6e2b1b01254b2fe9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6a95d91c0b315c965198f6ab7dec7c94129e17e0",
          "url": "https://git.kernel.org/stable/c/6a95d91c0b315c965198f6ab7dec7c94129e17e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6b4bf97587ef6c1927a78934b700204920655123",
          "url": "https://git.kernel.org/stable/c/6b4bf97587ef6c1927a78934b700204920655123"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7f84c937222944c03f4615ca4742df6bed0e5adf",
          "url": "https://git.kernel.org/stable/c/7f84c937222944c03f4615ca4742df6bed0e5adf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd02b2687d66f0a8e716384de4b9a0671331f1dc",
          "url": "https://git.kernel.org/stable/c/cd02b2687d66f0a8e716384de4b9a0671331f1dc"
        }
      ],
      "release_date": "2025-02-26T07:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52836",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlocking/ww_mutex/test: Fix potential workqueue corruption\n\nIn some cases running with the test-ww_mutex code, I was seeing\nodd behavior where sometimes it seemed flush_workqueue was\nreturning before all the work threads were finished.\n\nOften this would cause strange crashes as the mutexes would be\nfreed while they were being used.\n\nLooking at the code, there is a lifetime problem as the\ncontrolling thread that spawns the work allocates the\n\"struct stress\" structures that are passed to the workqueue\nthreads. Then when the workqueue threads are finished,\nthey free the stress struct that was passed to them.\n\nUnfortunately the workqueue work_struct node is in the stress\nstruct. Which means the work_struct is freed before the work\nthread returns and while flush_workqueue is waiting.\n\nIt seems like a better idea to have the controlling thread\nboth allocate and free the stress structures, so that we can\nbe sure we don't corrupt the workqueue by freeing the structure\nprematurely.\n\nSo this patch reworks the test to do so, and with this change\nI no longer see the early flush_workqueue returns.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52836"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/304a2c4aad0fff887ce493e4197bf9cbaf394479",
          "url": "https://git.kernel.org/stable/c/304a2c4aad0fff887ce493e4197bf9cbaf394479"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ed2d68b3925145f5f51c46559484881d6082f75",
          "url": "https://git.kernel.org/stable/c/9ed2d68b3925145f5f51c46559484881d6082f75"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bccdd808902f8c677317cec47c306e42b93b849e",
          "url": "https://git.kernel.org/stable/c/bccdd808902f8c677317cec47c306e42b93b849e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c56df79d68677cf062da1b6e3b33e74299a92dfc",
          "url": "https://git.kernel.org/stable/c/c56df79d68677cf062da1b6e3b33e74299a92dfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d4d37c9e6a4dbcca958dabd99216550525c7e389",
          "url": "https://git.kernel.org/stable/c/d4d37c9e6a4dbcca958dabd99216550525c7e389"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8267cabbe1bed15ccf8b0e684c528bf8eeef715",
          "url": "https://git.kernel.org/stable/c/d8267cabbe1bed15ccf8b0e684c528bf8eeef715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dcd85e3c929368076a7592b27f541e0da8b427f5",
          "url": "https://git.kernel.org/stable/c/dcd85e3c929368076a7592b27f541e0da8b427f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e36407713163363e65566e7af0abe207d5f59a0c",
          "url": "https://git.kernel.org/stable/c/e36407713163363e65566e7af0abe207d5f59a0c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e89d0ed45a419c485bae999426ecf92697cbdda3",
          "url": "https://git.kernel.org/stable/c/e89d0ed45a419c485bae999426ecf92697cbdda3"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52804",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Add validity check for db_maxag and db_agpref\n\nBoth db_maxag and db_agpref are used as the index of the\ndb_agfree array, but there is currently no validity check for\ndb_maxag and db_agpref, which can lead to errors.\n\nThe following is related bug reported by Syzbot:\n\nUBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20\nindex 7936 is out of range for type 'atomic_t[128]'\n\nAdd checking that the values of db_maxag and db_agpref are valid\nindexes for the db_agfree array.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52804"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e",
          "url": "https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f",
          "url": "https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b",
          "url": "https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f",
          "url": "https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e",
          "url": "https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb",
          "url": "https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a",
          "url": "https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809",
          "url": "https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40",
          "url": "https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39757",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nALSA: usb-audio: Validate UAC3 cluster segment descriptors\nUAC3 class segment descriptors need to be verified whether their sizes\nmatch with the declared lengths and whether they fit with the\nallocated buffer sizes, too.  Otherwise malicious firmware may lead to\nthe unexpected OOB accesses.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39757"
        }
      ],
      "release_date": "2025-09-11T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50367",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nfs: fix UAF/GPF bug in nilfs_mdt_destroy\nIn alloc_inode, inode_init_always() could return -ENOMEM if\nsecurity_inode_alloc() fails, which causes inode->i_private\nuninitialized. Then nilfs_is_metadata_file_inode() returns\ntrue and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),\nwhich frees the uninitialized inode->i_private\nand leads to crashes(e.g., UAF/GPF).\nFix this by moving security_inode_alloc just prior to\nthis_cpu_inc(nr_inodes)",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50367"
        }
      ],
      "release_date": "2025-09-17T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53365",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite ('Buffer Underflow')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nip6mr: Fix skb_under_panic in ip6mr_cache_report()\nskbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4\nhead:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg\n------------[ cut here ]------------\nkernel BUG at net/core/skbuff.c:192!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN\nCPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nWorkqueue: ipv6_addrconf addrconf_dad_work\nRIP: 0010:skb_panic+0x152/0x1d0\nCall Trace:\n<TASK>\nskb_push+0xc4/0xe0\nip6mr_cache_report+0xd69/0x19b0\nreg_vif_xmit+0x406/0x690\ndev_hard_start_xmit+0x17e/0x6e0\n__dev_queue_xmit+0x2d6a/0x3d20\nvlan_dev_hard_start_xmit+0x3ab/0x5c0\ndev_hard_start_xmit+0x17e/0x6e0\n__dev_queue_xmit+0x2d6a/0x3d20\nneigh_connected_output+0x3ed/0x570\nip6_finish_output2+0x5b5/0x1950\nip6_finish_output+0x693/0x11c0\nip6_output+0x24b/0x880\nNF_HOOK.constprop.0+0xfd/0x530\nndisc_send_skb+0x9db/0x1400\nndisc_send_rs+0x12a/0x6c0\naddrconf_dad_completed+0x3c9/0xea0\naddrconf_dad_work+0x849/0x1420\nprocess_one_work+0xa22/0x16e0\nworker_thread+0x679/0x10c0\nret_from_fork+0x28/0x60\nret_from_fork_asm+0x11/0x20\nWhen setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().\nreg_vif_xmit()\nip6mr_cache_report()\nskb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4\nAnd skb_push declared as:\nvoid *skb_push(struct sk_buff *skb, unsigned int len);\nskb->data -= len;\n//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850\nskb->data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53365"
        }
      ],
      "release_date": "2025-09-17T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37789",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix nested key length validation in the set() action\n\nIt's not safe to access nla_len(ovs_key) if the data is smaller than\nthe netlink header.  Check that the attribute is OK first.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37789"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b",
          "url": "https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec",
          "url": "https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce",
          "url": "https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba",
          "url": "https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd",
          "url": "https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7",
          "url": "https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4",
          "url": "https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc",
          "url": "https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T14:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-22121",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()\n\nThere's issue as follows:\nBUG: KASAN: use-after-free in ext4_xattr_inode_dec_ref_all+0x6ff/0x790\nRead of size 4 at addr ffff88807b003000 by task syz-executor.0/15172\n\nCPU: 3 PID: 15172 Comm: syz-executor.0\nCall Trace:\n __dump_stack lib/dump_stack.c:82 [inline]\n dump_stack+0xbe/0xfd lib/dump_stack.c:123\n print_address_description.constprop.0+0x1e/0x280 mm/kasan/report.c:400\n __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560\n kasan_report+0x3a/0x50 mm/kasan/report.c:585\n ext4_xattr_inode_dec_ref_all+0x6ff/0x790 fs/ext4/xattr.c:1137\n ext4_xattr_delete_inode+0x4c7/0xda0 fs/ext4/xattr.c:2896\n ext4_evict_inode+0xb3b/0x1670 fs/ext4/inode.c:323\n evict+0x39f/0x880 fs/inode.c:622\n iput_final fs/inode.c:1746 [inline]\n iput fs/inode.c:1772 [inline]\n iput+0x525/0x6c0 fs/inode.c:1758\n ext4_orphan_cleanup fs/ext4/super.c:3298 [inline]\n ext4_fill_super+0x8c57/0xba40 fs/ext4/super.c:5300\n mount_bdev+0x355/0x410 fs/super.c:1446\n legacy_get_tree+0xfe/0x220 fs/fs_context.c:611\n vfs_get_tree+0x8d/0x2f0 fs/super.c:1576\n do_new_mount fs/namespace.c:2983 [inline]\n path_mount+0x119a/0x1ad0 fs/namespace.c:3316\n do_mount+0xfc/0x110 fs/namespace.c:3329\n __do_sys_mount fs/namespace.c:3540 [inline]\n __se_sys_mount+0x219/0x2e0 fs/namespace.c:3514\n do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46\n entry_SYSCALL_64_after_hwframe+0x67/0xd1\n\nMemory state around the buggy address:\n ffff88807b002f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff88807b002f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n>ffff88807b003000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n                   ^\n ffff88807b003080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n ffff88807b003100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n\nAbove issue happens as ext4_xattr_delete_inode() isn't check xattr\nis valid if xattr is in inode.\nTo solve above issue call xattr_check_inode() check if xattr if valid\nin inode. In fact, we can directly verify in ext4_iget_extra_inode(),\nso that there is no divergent verification.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-22121"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c8fbb6ffb3c8f5164572ca88e4ccb6cd6a41ca8",
          "url": "https://git.kernel.org/stable/c/0c8fbb6ffb3c8f5164572ca88e4ccb6cd6a41ca8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5701875f9609b000d91351eaa6bfd97fe2f157f4",
          "url": "https://git.kernel.org/stable/c/5701875f9609b000d91351eaa6bfd97fe2f157f4"
        }
      ],
      "release_date": "2025-04-16T15:16:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39864",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nwifi: cfg80211: fix use-after-free in cmp_bss()\nFollowing bss_free() quirk introduced in commit 776b3580178f\n(\"cfg80211: track hidden SSID networks properly\"), adjust\ncfg80211_update_known_bss() to free the last beacon frame\nelements only if they're not shared via the corresponding\n'hidden_beacon_bss' pointer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39864"
        }
      ],
      "release_date": "2025-09-19T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53226",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nwifi: mwifiex: Fix OOB and integer underflow when rx packets\nMake sure mwifiex_process_mgmt_packet,\nmwifiex_process_sta_rx_packet and mwifiex_process_uap_rx_packet,\nmwifiex_uap_queue_bridged_pkt and mwifiex_process_rx_packet\nnot out-of-bounds access the skb->data buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53226"
        }
      ],
      "release_date": "2025-09-15T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-57904",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: at91: call input_free_device() on allocated iio_dev\n\nCurrent implementation of at91_ts_register() calls input_free_deivce()\non st->ts_input, however, the err label can be reached before the\nallocated iio_dev is stored to st->ts_input. Thus call\ninput_free_device() on input instead of st->ts_input.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-57904"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/028a1ba8e3bae593d701aee4f690ce7c195b67d6",
          "url": "https://git.kernel.org/stable/c/028a1ba8e3bae593d701aee4f690ce7c195b67d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09e067e3c83e0695d338e8a26916e3c2bc44be02",
          "url": "https://git.kernel.org/stable/c/09e067e3c83e0695d338e8a26916e3c2bc44be02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/25ef52f1c15db67d890b80203a911b9a57b0bf71",
          "url": "https://git.kernel.org/stable/c/25ef52f1c15db67d890b80203a911b9a57b0bf71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac8d932e3214c10ec641ad45a253929a596ead62",
          "url": "https://git.kernel.org/stable/c/ac8d932e3214c10ec641ad45a253929a596ead62"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b549c90bfe66f704878aa1e57b30ba15dab71935",
          "url": "https://git.kernel.org/stable/c/b549c90bfe66f704878aa1e57b30ba15dab71935"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d115b7f3ddc03b38bb7e8754601556fe9b4fc034",
          "url": "https://git.kernel.org/stable/c/d115b7f3ddc03b38bb7e8754601556fe9b4fc034"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de6a73bad1743e9e81ea5a24c178c67429ff510b",
          "url": "https://git.kernel.org/stable/c/de6a73bad1743e9e81ea5a24c178c67429ff510b"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
        }
      ],
      "release_date": "2025-01-19T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53373",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ncrypto: seqiv - Handle EBUSY correctly\nAs it is seqiv only handles the special return value of EINPROGERSS,\nwhich means that in all other cases it will free data related to the\nrequest.\nHowever, as the caller of seqiv may specify MAY_BACKLOG, we also need\nto expect EBUSY and treat it in the same way.  Otherwise backlogged\nrequests will trigger a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53373"
        }
      ],
      "release_date": "2025-09-18T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39730",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nNFS: Fix filehandle bounds checking in nfs_fh_to_dentry()\nThe function needs to check the minimal filehandle length before it can\naccess the embedded filehandle.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39730"
        }
      ],
      "release_date": "2025-09-07T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38718",
      "cwe": {
        "id": "CWE-664",
        "name": "Improper Control of a Resource Through its Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nsctp: linearize cloned gso packets in sctp_rcv\nA cloned head skb still shares these frag skbs in fraglist with the\noriginal head skb. It's not safe to access these frag skbs.\nsyzbot reported two use-of-uninitialized-memory bugs caused by this:\nBUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\nsctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\nsctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998\nsctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88\nsctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331\nsk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122\n__release_sock+0x1da/0x330 net/core/sock.c:3106\nrelease_sock+0x6b/0x250 net/core/sock.c:3660\nsctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360\nsctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885\nsctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031\ninet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851\nsock_sendmsg_nosec net/socket.c:718 [inline]\nand\nBUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\nsctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\nsctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88\nsctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331\nsk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n__release_sock+0x1d3/0x330 net/core/sock.c:3213\nrelease_sock+0x6b/0x270 net/core/sock.c:3767\nsctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367\nsctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886\nsctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032\ninet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851\nsock_sendmsg_nosec net/socket.c:712 [inline]\nThis patch fixes it by linearizing cloned gso packets in sctp_rcv().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38718"
        }
      ],
      "release_date": "2025-09-04T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53185",
      "cwe": {
        "id": "CWE-1285",
        "name": "Improper Validation of Specified Index, Position, or Offset in Input"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nwifi: ath9k: don't allow to overwrite ENDPOINT0 attributes\nA bad USB device is able to construct a service connection response\nmessage with target endpoint being ENDPOINT0 which is reserved for\nHTC_CTRL_RSVD_SVC and should not be modified to be used for any other\nservices.\nReject such service connection responses.\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53185"
        }
      ],
      "release_date": "2025-09-15T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50087",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails\n\nWhen scpi probe fails, at any point, we need to ensure that the scpi_info\nis not set and will remain NULL until the probe succeeds. If it is not\ntaken care, then it could result use-after-free as the value is exported\nvia get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()\nbut freed when the probe fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50087"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/08272646cd7c310642c39b7f54348fddd7987643",
          "url": "https://git.kernel.org/stable/c/08272646cd7c310642c39b7f54348fddd7987643"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c29e149b6bb498778ed8a1c9597b51acfba7856",
          "url": "https://git.kernel.org/stable/c/0c29e149b6bb498778ed8a1c9597b51acfba7856"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18048cba444a7c41dbf42c180d6b46606fc24c51",
          "url": "https://git.kernel.org/stable/c/18048cba444a7c41dbf42c180d6b46606fc24c51"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87",
          "url": "https://git.kernel.org/stable/c/4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5aa558232edc30468d1f35108826dd5b3ffe978f",
          "url": "https://git.kernel.org/stable/c/5aa558232edc30468d1f35108826dd5b3ffe978f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/689640efc0a2c4e07e6f88affe6d42cd40cc3f85",
          "url": "https://git.kernel.org/stable/c/689640efc0a2c4e07e6f88affe6d42cd40cc3f85"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/87c4896d5dd7fd9927c814cf3c6289f41de3b562",
          "url": "https://git.kernel.org/stable/c/87c4896d5dd7fd9927c814cf3c6289f41de3b562"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49145",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: CPPC: Avoid out of bounds access when parsing _CPC data\n\nIf the NumEntries field in the _CPC return package is less than 2, do\nnot attempt to access the \"Revision\" element of that package, because\nit may not be present then.\n\nBugLink: https://lore.kernel.org/lkml/20220322143534.GC32582@xsang-OptiPlex-9020/",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49145"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/28d5387c1994f5e1e0d41b30a1f3dd6e1f609252",
          "url": "https://git.kernel.org/stable/c/28d5387c1994f5e1e0d41b30a1f3dd6e1f609252"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40d8abf364bcab23bc715a9221a3c8623956257b",
          "url": "https://git.kernel.org/stable/c/40d8abf364bcab23bc715a9221a3c8623956257b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97b5593fd1b182b3fdb180b6bbe64ec09669988b",
          "url": "https://git.kernel.org/stable/c/97b5593fd1b182b3fdb180b6bbe64ec09669988b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3f15609ffa521de12244cd6af24002030dda3f5",
          "url": "https://git.kernel.org/stable/c/b3f15609ffa521de12244cd6af24002030dda3f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b80b19b32a432c9eee1cd200ef7aaddf608f54d1",
          "url": "https://git.kernel.org/stable/c/b80b19b32a432c9eee1cd200ef7aaddf608f54d1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb249f8c00f40dba83b7da8207ac14ca46e9ec9e",
          "url": "https://git.kernel.org/stable/c/cb249f8c00f40dba83b7da8207ac14ca46e9ec9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d208ea44e25b31db5a4d5e8c31df51787a3e9303",
          "url": "https://git.kernel.org/stable/c/d208ea44e25b31db5a4d5e8c31df51787a3e9303"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d7339f2a3938fb56b5f28d53f5345900b5fa0e74",
          "url": "https://git.kernel.org/stable/c/d7339f2a3938fb56b5f28d53f5345900b5fa0e74"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5b681822cac1f8093759b02e16c06b2c64b6788",
          "url": "https://git.kernel.org/stable/c/e5b681822cac1f8093759b02e16c06b2c64b6788"
        }
      ],
      "release_date": "2025-02-26T07:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48738",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: ops: Reject out of bounds values in snd_soc_put_volsw()\n\nWe don't currently validate that the values being set are within the range\nwe advertised to userspace as being valid, do so and reject any values\nthat are out of range.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48738"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d",
          "url": "https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7",
          "url": "https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf",
          "url": "https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7",
          "url": "https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0",
          "url": "https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830",
          "url": "https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a",
          "url": "https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d",
          "url": "https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d"
        }
      ],
      "release_date": "2024-06-20T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-36015",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-36015"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39",
          "url": "https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e",
          "url": "https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a",
          "url": "https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9",
          "url": "https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b",
          "url": "https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828",
          "url": "https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57",
          "url": "https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e",
          "url": "https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-05-29T08:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38635",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoundwire: cadence: fix invalid PDI offset\n\nFor some reason, we add an offset to the PDI, presumably to skip the\nPDI0 and PDI1 which are reserved for BPT.\n\nThis code is however completely wrong and leads to an out-of-bounds\naccess. We were just lucky so far since we used only a couple of PDIs\nand remained within the PDI array bounds.\n\nA Fixes: tag is not provided since there are no known platforms where\nthe out-of-bounds would be accessed, and the initial code had problems\nas well.\n\nA follow-up patch completely removes this useless offset.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38635"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/002364b2d594a9afc0385c09e00994c510b1d089",
          "url": "https://git.kernel.org/stable/c/002364b2d594a9afc0385c09e00994c510b1d089"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ebcaa0e5db9b6044bb487ae1cf41bc601761567",
          "url": "https://git.kernel.org/stable/c/2ebcaa0e5db9b6044bb487ae1cf41bc601761567"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4e99103f757cdf636c6ee860994a19a346a11785",
          "url": "https://git.kernel.org/stable/c/4e99103f757cdf636c6ee860994a19a346a11785"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7eeef1e935d23db5265233d92395bd5c648a4021",
          "url": "https://git.kernel.org/stable/c/7eeef1e935d23db5265233d92395bd5c648a4021"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ee1b439b1540ae543149b15a2a61b9dff937d91",
          "url": "https://git.kernel.org/stable/c/8ee1b439b1540ae543149b15a2a61b9dff937d91"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/902f6d656441a511ac25c6cffce74496db10a078",
          "url": "https://git.kernel.org/stable/c/902f6d656441a511ac25c6cffce74496db10a078"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328",
          "url": "https://git.kernel.org/stable/c/fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328"
        }
      ],
      "release_date": "2024-06-21T11:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53581",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/mlx5e: Check for NOT_READY flag state after locking\nCurrently the check for NOT_READY flag is performed before obtaining the\nnecessary lock. This opens a possibility for race condition when the flow\nis concurrently removed from unready_flows list by the workqueue task,\nwhich causes a double-removal from the list and a crash[0]. Fix the issue\nby moving the flag check inside the section protected by\nuplink_priv->unready_flows_lock mutex.\n[0]:\n[44376.389654] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] SMP\n[44376.391665] CPU: 7 PID: 59123 Comm: tc Not tainted 6.4.0-rc4+ #1\n[44376.392984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[44376.395342] RIP: 0010:mlx5e_tc_del_fdb_flow+0xb3/0x340 [mlx5_core]\n[44376.396857] Code: 00 48 8b b8 68 ce 02 00 e8 8a 4d 02 00 4c 8d a8 a8 01 00 00 4c 89 ef e8 8b 79 88 e1 48 8b 83 98 06 00 00 48 8b 93 90 06 00 00 <48> 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 83 90 06\n[44376.399167] RSP: 0018:ffff88812cc97570 EFLAGS: 00010246\n[44376.399680] RAX: dead000000000122 RBX: ffff8881088e3800 RCX: ffff8881881bac00\n[44376.400337] RDX: dead000000000100 RSI: ffff88812cc97500 RDI: ffff8881242f71b0\n[44376.401001] RBP: ffff88811cbb0940 R08: 0000000000000400 R09: 0000000000000001\n[44376.401663] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88812c944000\n[44376.402342] R13: ffff8881242f71a8 R14: ffff8881222b4000 R15: 0000000000000000\n[44376.402999] FS:  00007f0451104800(0000) GS:ffff88852cb80000(0000) knlGS:0000000000000000\n[44376.403787] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[44376.404343] CR2: 0000000000489108 CR3: 0000000123a79003 CR4: 0000000000370ea0\n[44376.405004] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[44376.405665] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[44376.406339] Call Trace:\n[44376.406651]  <TASK>\n[44376.406939]  ? die_addr+0x33/0x90\n[44376.407311]  ? exc_general_protection+0x192/0x390\n[44376.407795]  ? asm_exc_general_protection+0x22/0x30\n[44376.408292]  ? mlx5e_tc_del_fdb_flow+0xb3/0x340 [mlx5_core]\n[44376.408876]  __mlx5e_tc_del_fdb_peer_flow+0xbc/0xe0 [mlx5_core]\n[44376.409482]  mlx5e_tc_del_flow+0x42/0x210 [mlx5_core]\n[44376.410055]  mlx5e_flow_put+0x25/0x50 [mlx5_core]\n[44376.410529]  mlx5e_delete_flower+0x24b/0x350 [mlx5_core]\n[44376.411043]  tc_setup_cb_reoffload+0x22/0x80\n[44376.411462]  fl_reoffload+0x261/0x2f0 [cls_flower]\n[44376.411907]  ? mlx5e_rep_indr_setup_ft_cb+0x160/0x160 [mlx5_core]\n[44376.412481]  ? mlx5e_rep_indr_setup_ft_cb+0x160/0x160 [mlx5_core]\n[44376.413044]  tcf_block_playback_offloads+0x76/0x170\n[44376.413497]  tcf_block_unbind+0x7b/0xd0\n[44376.413881]  tcf_block_setup+0x17d/0x1c0\n[44376.414269]  tcf_block_offload_cmd.isra.0+0xf1/0x130\n[44376.414725]  tcf_block_offload_unbind+0x43/0x70\n[44376.415153]  __tcf_block_put+0x82/0x150\n[44376.415532]  ingress_destroy+0x22/0x30 [sch_ingress]\n[44376.415986]  qdisc_destroy+0x3b/0xd0\n[44376.416343]  qdisc_graft+0x4d0/0x620\n[44376.416706]  tc_get_qdisc+0x1c9/0x3b0\n[44376.417074]  rtnetlink_rcv_msg+0x29c/0x390\n[44376.419978]  ? rep_movs_alternative+0x3a/0xa0\n[44376.420399]  ? rtnl_calcit.isra.0+0x120/0x120\n[44376.420813]  netlink_rcv_skb+0x54/0x100\n[44376.421192]  netlink_unicast+0x1f6/0x2c0\n[44376.421573]  netlink_sendmsg+0x232/0x4a0\n[44376.421980]  sock_sendmsg+0x38/0x60\n[44376.422328]  ____sys_sendmsg+0x1d0/0x1e0\n[44376.422709]  ? copy_msghdr_from_user+0x6d/0xa0\n[44376.423127]  ___sys_sendmsg+0x80/0xc0\n[44376.423495]  ? ___sys_recvmsg+0x8b/0xc0\n[44376.423869]  __sys_sendmsg+0x51/0x90\n[44376.424226]  do_syscall_64+0x3d/0x90\n[44376.424587]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n[44376.425046] RIP: 0033:0x7f045134f887\n[44376.425403] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53581"
        }
      ],
      "release_date": "2025-10-04T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38659",
      "cwe": {
        "id": "CWE-1284",
        "name": "Improper Validation of Specified Quantity in Input"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nenic: Validate length of nl attributes in enic_set_vf_port\n\nenic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE\nis of length PORT_PROFILE_MAX and that the nl attributes\nIFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.\nThese attributes are validated (in the function do_setlink in rtnetlink.c)\nusing the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE\nas NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and\nIFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation\nusing the policy is for the max size of the attributes and not on exact\nsize so the length of these attributes might be less than the sizes that\nenic_set_vf_port expects. This might cause an out of bands\nread access in the memcpys of the data of these\nattributes in enic_set_vf_port.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38659"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/25571a12fbc8a1283bd8380d461267956fd426f7",
          "url": "https://git.kernel.org/stable/c/25571a12fbc8a1283bd8380d461267956fd426f7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b649d7e0cb42a660f0260ef25fd55fdc9c6c600",
          "url": "https://git.kernel.org/stable/c/2b649d7e0cb42a660f0260ef25fd55fdc9c6c600"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c0d36972edbe56fcf98899622d9b90ac9965227",
          "url": "https://git.kernel.org/stable/c/3c0d36972edbe56fcf98899622d9b90ac9965227"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7077c22f84f41974a711604a42fd0e0684232ee5",
          "url": "https://git.kernel.org/stable/c/7077c22f84f41974a711604a42fd0e0684232ee5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee1955a1509a921c05c70dad5d6fc8563dfcb31",
          "url": "https://git.kernel.org/stable/c/aee1955a1509a921c05c70dad5d6fc8563dfcb31"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ca63fb7af9d3e531aa25f7ae187bfc6c7166ec2d",
          "url": "https://git.kernel.org/stable/c/ca63fb7af9d3e531aa25f7ae187bfc6c7166ec2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e8021b94b0412c37bcc79027c2e382086b6ce449",
          "url": "https://git.kernel.org/stable/c/e8021b94b0412c37bcc79027c2e382086b6ce449"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f6638e955ca00c489894789492776842e102af9c",
          "url": "https://git.kernel.org/stable/c/f6638e955ca00c489894789492776842e102af9c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-06-21T11:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37796",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: at76c50x: fix use after free access in at76_disconnect\n\nThe memory pointed to by priv is freed at the end of at76_delete_device\nfunction (using ieee80211_free_hw). But the code then accesses the udev\nfield of the freed object to put the USB device. This may also lead to a\nmemory leak of the usb device. Fix this by using udev from interface.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37796"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/152721cbae42713ecfbca6847e0f102ee6b19546",
          "url": "https://git.kernel.org/stable/c/152721cbae42713ecfbca6847e0f102ee6b19546"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27c7e63b3cb1a20bb78ed4a36c561ea4579fd7da",
          "url": "https://git.kernel.org/stable/c/27c7e63b3cb1a20bb78ed4a36c561ea4579fd7da"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c619aec1f538333b56746d2f796aab1bca5c9a5",
          "url": "https://git.kernel.org/stable/c/3c619aec1f538333b56746d2f796aab1bca5c9a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e7df74745700f059dc117a620e566964a2e8f2c",
          "url": "https://git.kernel.org/stable/c/5e7df74745700f059dc117a620e566964a2e8f2c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e4ab3e574c2a335b40fa1f70d1c54fcb58ab33f",
          "url": "https://git.kernel.org/stable/c/6e4ab3e574c2a335b40fa1f70d1c54fcb58ab33f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ca513631fa6ad3011b8b9197cdde0f351103704",
          "url": "https://git.kernel.org/stable/c/7ca513631fa6ad3011b8b9197cdde0f351103704"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a9682bfef2cf3802515a902e964d774e137be1b9",
          "url": "https://git.kernel.org/stable/c/a9682bfef2cf3802515a902e964d774e137be1b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c731cdfddcf1be1590d5ba8c9b508f98e3a2b3d6",
          "url": "https://git.kernel.org/stable/c/c731cdfddcf1be1590d5ba8c9b508f98e3a2b3d6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T14:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49519",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath10k: skip ath10k_halt during suspend for driver state RESTARTING\n\nDouble free crash is observed when FW recovery(caused by wmi\ntimeout/crash) is followed by immediate suspend event. The FW recovery\nis triggered by ath10k_core_restart() which calls driver clean up via\nath10k_halt(). When the suspend event occurs between the FW recovery,\nthe restart worker thread is put into frozen state until suspend completes.\nThe suspend event triggers ath10k_stop() which again triggers ath10k_halt()\nThe double invocation of ath10k_halt() causes ath10k_htt_rx_free() to be\ncalled twice(Note: ath10k_htt_rx_alloc was not called by restart worker\nthread because of its frozen state), causing the crash.\n\nTo fix this, during the suspend flow, skip call to ath10k_halt() in\nath10k_stop() when the current driver state is ATH10K_STATE_RESTARTING.\nAlso, for driver state ATH10K_STATE_RESTARTING, call\nath10k_wait_for_suspend() in ath10k_stop(). This is because call to\nath10k_wait_for_suspend() is skipped later in\n[ath10k_halt() > ath10k_core_stop()] for the driver state\nATH10K_STATE_RESTARTING.\n\nThe frozen restart worker thread will be cancelled during resume when the\ndevice comes out of suspend.\n\nBelow is the crash stack for reference:\n\n[  428.469167] ------------[ cut here ]------------\n[  428.469180] kernel BUG at mm/slub.c:4150!\n[  428.469193] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[  428.469219] Workqueue: events_unbound async_run_entry_fn\n[  428.469230] RIP: 0010:kfree+0x319/0x31b\n[  428.469241] RSP: 0018:ffffa1fac015fc30 EFLAGS: 00010246\n[  428.469247] RAX: ffffedb10419d108 RBX: ffff8c05262b0000\n[  428.469252] RDX: ffff8c04a8c07000 RSI: 0000000000000000\n[  428.469256] RBP: ffffa1fac015fc78 R08: 0000000000000000\n[  428.469276] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  428.469285] Call Trace:\n[  428.469295]  ? dma_free_attrs+0x5f/0x7d\n[  428.469320]  ath10k_core_stop+0x5b/0x6f\n[  428.469336]  ath10k_halt+0x126/0x177\n[  428.469352]  ath10k_stop+0x41/0x7e\n[  428.469387]  drv_stop+0x88/0x10e\n[  428.469410]  __ieee80211_suspend+0x297/0x411\n[  428.469441]  rdev_suspend+0x6e/0xd0\n[  428.469462]  wiphy_suspend+0xb1/0x105\n[  428.469483]  ? name_show+0x2d/0x2d\n[  428.469490]  dpm_run_callback+0x8c/0x126\n[  428.469511]  ? name_show+0x2d/0x2d\n[  428.469517]  __device_suspend+0x2e7/0x41b\n[  428.469523]  async_suspend+0x1f/0x93\n[  428.469529]  async_run_entry_fn+0x3d/0xd1\n[  428.469535]  process_one_work+0x1b1/0x329\n[  428.469541]  worker_thread+0x213/0x372\n[  428.469547]  kthread+0x150/0x15f\n[  428.469552]  ? pr_cont_work+0x58/0x58\n[  428.469558]  ? kthread_blkcg+0x31/0x31\n\nTested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49519"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5321e5211b5dc873e2e3d0deb749e69ecf4dbfe5",
          "url": "https://git.kernel.org/stable/c/5321e5211b5dc873e2e3d0deb749e69ecf4dbfe5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7eb14cb604f49e58b7cf6faa87961a865a3c8649",
          "url": "https://git.kernel.org/stable/c/7eb14cb604f49e58b7cf6faa87961a865a3c8649"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8aa3750986ffcf73e0692db3b40dd3a8e8c0c575",
          "url": "https://git.kernel.org/stable/c/8aa3750986ffcf73e0692db3b40dd3a8e8c0c575"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b72a4aff947ba807177bdabb43debaf2c66bee05",
          "url": "https://git.kernel.org/stable/c/b72a4aff947ba807177bdabb43debaf2c66bee05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2272428090d0d215a3f017cbbbad731c07eee53",
          "url": "https://git.kernel.org/stable/c/c2272428090d0d215a3f017cbbbad731c07eee53"
        }
      ],
      "release_date": "2025-02-26T07:01:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52847",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: bttv: fix use after free error due to btv->timeout timer\n\nThere may be some a race condition between timer function\nbttv_irq_timeout and bttv_remove. The timer is setup in\nprobe and there is no timer_delete operation in remove\nfunction. When it hit kfree btv, the function might still be\ninvoked, which will cause use after free bug.\n\nThis bug is found by static analysis, it may be false positive.\n\nFix it by adding del_timer_sync invoking to the remove function.\n\ncpu0                cpu1\n                  bttv_probe\n                    ->timer_setup\n                      ->bttv_set_dma\n                        ->mod_timer;\nbttv_remove\n  ->kfree(btv);\n                  ->bttv_irq_timeout\n                    ->USE btv",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52847"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267",
          "url": "https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226",
          "url": "https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b",
          "url": "https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574",
          "url": "https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132",
          "url": "https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a",
          "url": "https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9",
          "url": "https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda",
          "url": "https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49073",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nata: sata_dwc_460ex: Fix crash due to OOB write\n\nthe driver uses libata's \"tag\" values from in various arrays.\nSince the mentioned patch bumped the ATA_TAG_INTERNAL to 32,\nthe value of the SATA_DWC_QCMD_MAX needs to account for that.\n\nOtherwise ATA_TAG_INTERNAL usage cause similar crashes like\nthis as reported by Tice Rex on the OpenWrt Forum and\nreproduced (with symbols) here:\n\n| BUG: Kernel NULL pointer dereference at 0x00000000\n| Faulting instruction address: 0xc03ed4b8\n| Oops: Kernel access of bad area, sig: 11 [#1]\n| BE PAGE_SIZE=4K PowerPC 44x Platform\n| CPU: 0 PID: 362 Comm: scsi_eh_1 Not tainted 5.4.163 #0\n| NIP:  c03ed4b8 LR: c03d27e8 CTR: c03ed36c\n| REGS: cfa59950 TRAP: 0300   Not tainted  (5.4.163)\n| MSR:  00021000 <CE,ME>  CR: 42000222  XER: 00000000\n| DEAR: 00000000 ESR: 00000000\n| GPR00: c03d27e8 cfa59a08 cfa55fe0 00000000 0fa46bc0 [...]\n| [..]\n| NIP [c03ed4b8] sata_dwc_qc_issue+0x14c/0x254\n| LR [c03d27e8] ata_qc_issue+0x1c8/0x2dc\n| Call Trace:\n| [cfa59a08] [c003f4e0] __cancel_work_timer+0x124/0x194 (unreliable)\n| [cfa59a78] [c03d27e8] ata_qc_issue+0x1c8/0x2dc\n| [cfa59a98] [c03d2b3c] ata_exec_internal_sg+0x240/0x524\n| [cfa59b08] [c03d2e98] ata_exec_internal+0x78/0xe0\n| [cfa59b58] [c03d30fc] ata_read_log_page.part.38+0x1dc/0x204\n| [cfa59bc8] [c03d324c] ata_identify_page_supported+0x68/0x130\n| [...]\n\nThis is because sata_dwc_dma_xfer_complete() NULLs the\ndma_pending's next neighbour \"chan\" (a *dma_chan struct) in\nthis '32' case right here (line ~735):\n> hsdevp->dma_pending[tag] = SATA_DWC_DMA_PENDING_NONE;\n\nThen the next time, a dma gets issued; dma_dwc_xfer_setup() passes\nthe NULL'd hsdevp->chan to the dmaengine_slave_config() which then\ncauses the crash.\n\nWith this patch, SATA_DWC_QCMD_MAX is now set to ATA_MAX_QUEUE + 1.\nThis avoids the OOB. But please note, there was a worthwhile discussion\non what ATA_TAG_INTERNAL and ATA_MAX_QUEUE is. And why there should not\nbe a \"fake\" 33 command-long queue size.\n\nIdeally, the dw driver should account for the ATA_TAG_INTERNAL.\nIn Damien Le Moal's words: \"... having looked at the driver, it\nis a bigger change than just faking a 33rd \"tag\" that is in fact\nnot a command tag at all.\"\n\nBugLink: https://github.com/openwrt/openwrt/issues/9505",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49073"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/234c0132f76f0676d175757f61b0025191a3d935",
          "url": "https://git.kernel.org/stable/c/234c0132f76f0676d175757f61b0025191a3d935"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a8751c0d4e24129e72dcec0139e99833b13904a",
          "url": "https://git.kernel.org/stable/c/3a8751c0d4e24129e72dcec0139e99833b13904a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/55e1465ba79562a191708a40eeae3f8082a209e3",
          "url": "https://git.kernel.org/stable/c/55e1465ba79562a191708a40eeae3f8082a209e3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/596c7efd69aae94f4b0e91172b075eb197958b99",
          "url": "https://git.kernel.org/stable/c/596c7efd69aae94f4b0e91172b075eb197958b99"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7aa8104a554713b685db729e66511b93d989dd6a",
          "url": "https://git.kernel.org/stable/c/7aa8104a554713b685db729e66511b93d989dd6a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a05a6952ecd59aaa62cbdcdaf523ae2c8f436e8",
          "url": "https://git.kernel.org/stable/c/8a05a6952ecd59aaa62cbdcdaf523ae2c8f436e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc629224aa62f23849cae83717932985ac51232d",
          "url": "https://git.kernel.org/stable/c/fc629224aa62f23849cae83717932985ac51232d"
        }
      ],
      "release_date": "2025-02-26T07:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48759",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev\n\nstruct rpmsg_ctrldev contains a struct cdev. The current code frees\nthe rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the\ncdev is a managed object, therefore its release is not predictable\nand the rpmsg_ctrldev could be freed before the cdev is entirely\nreleased, as in the backtrace below.\n\n[   93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c\n[   93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0\n[   93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v\n[   93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G    B             5.4.163-lockdep #26\n[   93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)\n[   93.730055] Workqueue: events kobject_delayed_cleanup\n[   93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)\n[   93.740216] pc : debug_print_object+0x13c/0x1b0\n[   93.744890] lr : debug_print_object+0x13c/0x1b0\n[   93.749555] sp : ffffffacf5bc7940\n[   93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000\n[   93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000\n[   93.763916] x25: ffffffd0734f856c x24: dfffffd000000000\n[   93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0\n[   93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0\n[   93.780338] x19: ffffffd075199100 x18: 00000000000276e0\n[   93.785814] x17: 0000000000000000 x16: dfffffd000000000\n[   93.791291] x15: ffffffffffffffff x14: 6e6968207473696c\n[   93.796768] x13: 0000000000000000 x12: ffffffd075e2b000\n[   93.802244] x11: 0000000000000001 x10: 0000000000000000\n[   93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900\n[   93.813200] x7 : 0000000000000000 x6 : 0000000000000000\n[   93.818676] x5 : 0000000000000080 x4 : 0000000000000000\n[   93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001\n[   93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061\n[   93.835104] Call trace:\n[   93.837644]  debug_print_object+0x13c/0x1b0\n[   93.841963]  __debug_check_no_obj_freed+0x25c/0x3c0\n[   93.846987]  debug_check_no_obj_freed+0x18/0x20\n[   93.851669]  slab_free_freelist_hook+0xbc/0x1e4\n[   93.856346]  kfree+0xfc/0x2f4\n[   93.859416]  rpmsg_ctrldev_release_device+0x78/0xb8\n[   93.864445]  device_release+0x84/0x168\n[   93.868310]  kobject_cleanup+0x12c/0x298\n[   93.872356]  kobject_delayed_cleanup+0x10/0x18\n[   93.876948]  process_one_work+0x578/0x92c\n[   93.881086]  worker_thread+0x804/0xcf8\n[   93.884963]  kthread+0x2a8/0x314\n[   93.888303]  ret_from_fork+0x10/0x18\n\nThe cdev_device_add/del() API was created to address this issue (see\ncommit '233ed09d7fda (\"chardev: add helper function to register char\ndevs with a struct device\")'), use it instead of cdev add/del().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48759"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1dbb206730f3e5ce90014ad569ddf8167ec4124a",
          "url": "https://git.kernel.org/stable/c/1dbb206730f3e5ce90014ad569ddf8167ec4124a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70cb4295ec806b663665e1d2ed15caab6159880e",
          "url": "https://git.kernel.org/stable/c/70cb4295ec806b663665e1d2ed15caab6159880e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74d85e9fbc7022a4011102c7474a9c7aeb704a35",
          "url": "https://git.kernel.org/stable/c/74d85e9fbc7022a4011102c7474a9c7aeb704a35"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/85aba11a8ea92a8eef2de95ebbe063086fd62d9c",
          "url": "https://git.kernel.org/stable/c/85aba11a8ea92a8eef2de95ebbe063086fd62d9c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b7fb2dad571d1e21173c06cef0bced77b323990a",
          "url": "https://git.kernel.org/stable/c/b7fb2dad571d1e21173c06cef0bced77b323990a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d6cdc6ae542845d4d0ac8b6d99362bde7042a3c7",
          "url": "https://git.kernel.org/stable/c/d6cdc6ae542845d4d0ac8b6d99362bde7042a3c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da27b834c1e0222e149e06caddf7718478086d1b",
          "url": "https://git.kernel.org/stable/c/da27b834c1e0222e149e06caddf7718478086d1b"
        }
      ],
      "release_date": "2024-06-20T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38498",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndo_change_type(): refuse to operate on unmounted/not ours mounts\nEnsure that propagation settings can only be changed for mounts located\nin the caller's mount namespace. This change aligns permission checking\nwith the rest of mount(2).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38498"
        }
      ],
      "release_date": "2025-07-30T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38461",
      "cwe": {
        "id": "CWE-664",
        "name": "Improper Control of a Resource Through its Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nvsock: Fix transport_* TOCTOU\nTransport assignment may race with module unload. Protect new_transport\nfrom becoming a stale pointer.\nThis also takes care of an insecure call in vsock_use_local_transport();\nadd a lockdep assert.\nBUG: unable to handle page fault for address: fffffbfff8056000\nOops: Oops: 0000 [#1] SMP KASAN\nRIP: 0010:vsock_assign_transport+0x366/0x600\nCall Trace:\nvsock_connect+0x59c/0xc40\n__sys_connect+0xe8/0x100\n__x64_sys_connect+0x6e/0xc0\ndo_syscall_64+0x92/0x1c0\nentry_SYSCALL_64_after_hwframe+0x4b/0x53",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38461"
        }
      ],
      "release_date": "2025-07-25T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-21704",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdc-acm: Check control transfer buffer size before access\n\nIf the first fragment is shorter than struct usb_cdc_notification, we can't\ncalculate an expected_size. Log an error and discard the notification\ninstead of reading lengths from memory outside the received data, which can\nlead to memory corruption when the expected_size decreases between\nfragments, causing `expected_size - acm->nb_index` to wrap.\n\nThis issue has been present since the beginning of git history; however,\nit only leads to memory corruption since commit ea2583529cd1\n(\"cdc-acm: reassemble fragmented notifications\").\n\nA mitigating factor is that acm_ctrl_irq() can only execute after userspace\nhas opened /dev/ttyACM*; but if ModemManager is running, ModemManager will\ndo that automatically depending on the USB device's vendor/product IDs and\nits other interfaces.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21704"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/383d516a0ebc8641372b521c8cb717f0f1834831",
          "url": "https://git.kernel.org/stable/c/383d516a0ebc8641372b521c8cb717f0f1834831"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6abb510251e75f875797d8983a830e6731fa281c",
          "url": "https://git.kernel.org/stable/c/6abb510251e75f875797d8983a830e6731fa281c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7828e9363ac4d23b02419bf2a45b9f1d9fb35646",
          "url": "https://git.kernel.org/stable/c/7828e9363ac4d23b02419bf2a45b9f1d9fb35646"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/871619c2b78fdfe05afb4e8ba548678687beb812",
          "url": "https://git.kernel.org/stable/c/871619c2b78fdfe05afb4e8ba548678687beb812"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90dd2f1b7342b9a671a5ea4160f408037b92b118",
          "url": "https://git.kernel.org/stable/c/90dd2f1b7342b9a671a5ea4160f408037b92b118"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a4e1ae5c0533964170197e4fb4f33bc8c1db5cd2",
          "url": "https://git.kernel.org/stable/c/a4e1ae5c0533964170197e4fb4f33bc8c1db5cd2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e563b01208f4d1f609bcab13333b6c0e24ce6a01",
          "url": "https://git.kernel.org/stable/c/e563b01208f4d1f609bcab13333b6c0e24ce6a01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f64079bef6a8a7823358c3f352ea29a617844636",
          "url": "https://git.kernel.org/stable/c/f64079bef6a8a7823358c3f352ea29a617844636"
        },
        {
          "category": "external",
          "summary": "https://project-zero.issues.chromium.org/issues/395107243",
          "url": "https://project-zero.issues.chromium.org/issues/395107243"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-02-22T10:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-52332",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix potential invalid memory access in igb_init_module()\n\nThe pci_register_driver() can fail and when this happened, the dca_notifier\nneeds to be unregistered, otherwise the dca_notifier can be called when\nigb fails to install, resulting to invalid memory access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-52332"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0566f83d206c7a864abcd741fe39d6e0ae5eef29",
          "url": "https://git.kernel.org/stable/c/0566f83d206c7a864abcd741fe39d6e0ae5eef29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4458046617dfadc351162dbaea1945c57eebdf36",
          "url": "https://git.kernel.org/stable/c/4458046617dfadc351162dbaea1945c57eebdf36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fe517643f529e805bb6b890a4331c100e8f2484",
          "url": "https://git.kernel.org/stable/c/4fe517643f529e805bb6b890a4331c100e8f2484"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8009cdcc493fa30d4572016daf2d6999da4d6c54",
          "url": "https://git.kernel.org/stable/c/8009cdcc493fa30d4572016daf2d6999da4d6c54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/992fd34122de377b45cb75b64fc7f17fc1e6ed2f",
          "url": "https://git.kernel.org/stable/c/992fd34122de377b45cb75b64fc7f17fc1e6ed2f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0155b1b1509d0ef4799bd1cd73309ca466df3f3",
          "url": "https://git.kernel.org/stable/c/e0155b1b1509d0ef4799bd1cd73309ca466df3f3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f309733a8c9da7d4266a8a3755020b738a570cae",
          "url": "https://git.kernel.org/stable/c/f309733a8c9da7d4266a8a3755020b738a570cae"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
        }
      ],
      "release_date": "2025-01-11T13:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49292",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: oss: Fix PCM OSS buffer allocation overflow\n\nWe've got syzbot reports hitting INT_MAX overflow at vmalloc()\nallocation that is called from snd_pcm_plug_alloc().  Although we\napply the restrictions to input parameters, it's based only on the\nhw_params of the underlying PCM device.  Since the PCM OSS layer\nallocates a temporary buffer for the data conversion, the size may\nbecome unexpectedly large when more channels or higher rates is given;\nin the reported case, it went over INT_MAX, hence it hits WARN_ON().\n\nThis patch is an attempt to avoid such an overflow and an allocation\nfor too large buffers.  First off, it adds the limit of 1MB as the\nupper bound for period bytes.  This must be large enough for all use\ncases, and we really don't want to handle a larger temporary buffer\nthan this size.  The size check is performed at two places, where the\noriginal period bytes is calculated and where the plugin buffer size\nis calculated.\n\nIn addition, the driver uses array_size() and array3_size() for\nmultiplications to catch overflows for the converted period size and\nbuffer bytes.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49292"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c4190b41a69990666b4000999e27f8f1b2a426b",
          "url": "https://git.kernel.org/stable/c/0c4190b41a69990666b4000999e27f8f1b2a426b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ce74ff7059341d8b2f4d01c3383491df63d1898",
          "url": "https://git.kernel.org/stable/c/5ce74ff7059341d8b2f4d01c3383491df63d1898"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a40cbf3579a8e14849ba7ce46309c1992658d2b",
          "url": "https://git.kernel.org/stable/c/7a40cbf3579a8e14849ba7ce46309c1992658d2b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a63af1baf0a5e11827db60e3127f87e437cab6e5",
          "url": "https://git.kernel.org/stable/c/a63af1baf0a5e11827db60e3127f87e437cab6e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e74a069c6a7bb505f3ade141dddf85f4b0b5145a",
          "url": "https://git.kernel.org/stable/c/e74a069c6a7bb505f3ade141dddf85f4b0b5145a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/efb6402c3c4a7c26d97c92d70186424097b6e366",
          "url": "https://git.kernel.org/stable/c/efb6402c3c4a7c26d97c92d70186424097b6e366"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb08bf99195a87c798bc8ae1357337a981faeade",
          "url": "https://git.kernel.org/stable/c/fb08bf99195a87c798bc8ae1357337a981faeade"
        }
      ],
      "release_date": "2025-02-26T07:01:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53125",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: smsc75xx: Limit packet length to skb->len\n\nPacket length retrieved from skb data may be larger than\nthe actual socket buffer length (up to 9026 bytes). In such\ncase the cloned skb passed up the network stack will leak\nkernel memory contents.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53125"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/105db6574281e1e03fcbf87983f4fee111682306",
          "url": "https://git.kernel.org/stable/c/105db6574281e1e03fcbf87983f4fee111682306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a4de0a68b18485c68ab4f0cfa665b1633c6d277",
          "url": "https://git.kernel.org/stable/c/4a4de0a68b18485c68ab4f0cfa665b1633c6d277"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/53966d572d056d6b234cfe76a5f9d60049d3c178",
          "url": "https://git.kernel.org/stable/c/53966d572d056d6b234cfe76a5f9d60049d3c178"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6",
          "url": "https://git.kernel.org/stable/c/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9fabdd79051a9fe51388df099aff6e4b660fedd2",
          "url": "https://git.kernel.org/stable/c/9fabdd79051a9fe51388df099aff6e4b660fedd2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c7bdc137ca163b90917c1eeba4f1937684bd4f8b",
          "url": "https://git.kernel.org/stable/c/c7bdc137ca163b90917c1eeba4f1937684bd4f8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8b228318935044dafe3a5bc07ee71a1f1424b8d",
          "url": "https://git.kernel.org/stable/c/d8b228318935044dafe3a5bc07ee71a1f1424b8d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e294f0aa47e4844f3d3c8766c02accd5a76a7d4e",
          "url": "https://git.kernel.org/stable/c/e294f0aa47e4844f3d3c8766c02accd5a76a7d4e"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-49985",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nbpf: Don't use tnum_range on array range checking for poke descriptors\nHsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which\nis based on a customized syzkaller:\nBUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0\nRead of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489\nCPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n<TASK>\ndump_stack_lvl+0x9c/0xc9\nprint_address_description.constprop.0+0x1f/0x1f0\n? bpf_int_jit_compile+0x1257/0x13f0\nkasan_report.cold+0xeb/0x197\n? kvmalloc_node+0x170/0x200\n? bpf_int_jit_compile+0x1257/0x13f0\nbpf_int_jit_compile+0x1257/0x13f0\n? arch_prepare_bpf_dispatcher+0xd0/0xd0\n? rcu_read_lock_sched_held+0x43/0x70\nbpf_prog_select_runtime+0x3e8/0x640\n? bpf_obj_name_cpy+0x149/0x1b0\nbpf_prog_load+0x102f/0x2220\n? __bpf_prog_put.constprop.0+0x220/0x220\n? find_held_lock+0x2c/0x110\n? __might_fault+0xd6/0x180\n? lock_downgrade+0x6e0/0x6e0\n? lock_is_held_type+0xa6/0x120\n? __might_fault+0x147/0x180\n__sys_bpf+0x137b/0x6070\n? bpf_perf_link_attach+0x530/0x530\n? new_sync_read+0x600/0x600\n? __fget_files+0x255/0x450\n? lock_downgrade+0x6e0/0x6e0\n? fput+0x30/0x1a0\n? ksys_write+0x1a8/0x260\n__x64_sys_bpf+0x7a/0xc0\n? syscall_enter_from_user_mode+0x21/0x70\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7f917c4e2c2d\nThe problem here is that a range of tnum_range(0, map->max_entries - 1) has\nlimited ability to represent the concrete tight range with the tnum as the\nset of resulting states from value + mask can result in a superset of the\nactual intended range, and as such a tnum_in(range, reg->var_off) check may\nyield true when it shouldn't, for example tnum_range(0, 2) would result in\n00XX -> v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here\nrepresented by a less precise superset of {0, 1, 2, 3}. As the register is\nknown const scalar, really just use the concrete reg->var_off.value for the\nupper index check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49985"
        }
      ],
      "release_date": "2025-06-18T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52867",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: possible buffer overflow\n\nBuffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is\nchecked after access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52867"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783",
          "url": "https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45",
          "url": "https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58",
          "url": "https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94",
          "url": "https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896",
          "url": "https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f",
          "url": "https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855",
          "url": "https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4",
          "url": "https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783",
          "url": "https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50228",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nKVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0\nDon't BUG/WARN on interrupt injection due to GIF being cleared,\nsince it's trivial for userspace to force the situation via\nKVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct\nfor KVM internally generated injections).\nkernel BUG at arch/x86/kvm/svm/svm.c:3386!\ninvalid opcode: 0000 [#1] SMP\nCPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\nRIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]\nCode: <0f> 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53\nRSP: 0018:ffffc90000b37d88 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006\nRDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0\nRBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\nR13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000\nFS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0\nCall Trace:\n<TASK>\ninject_pending_event+0x2f7/0x4c0 [kvm]\nkvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]\nkvm_vcpu_ioctl+0x26d/0x650 [kvm]\n__x64_sys_ioctl+0x82/0xb0\ndo_syscall_64+0x3b/0xc0\nentry_SYSCALL_64_after_hwframe+0x44/0xae\n</TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50228"
        }
      ],
      "release_date": "2025-06-18T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53675",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: ses: Fix possible desc_ptr out-of-bounds accesses\nSanitize possible desc_ptr out-of-bounds accesses in\nses_enclosure_data_process().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53675"
        }
      ],
      "release_date": "2025-10-07T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39841",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: lpfc: Fix buffer free/clear order in deferred receive path\nFix a use-after-free window by correcting the buffer release sequence in\nthe deferred receive path. The code freed the RQ buffer first and only\nthen cleared the context pointer under the lock. Concurrent paths (e.g.,\nABTS and the repost path) also inspect and release the same pointer under\nthe lock, so the old order could lead to double-free/UAF.\nNote that the repost path already uses the correct pattern: detach the\npointer under the lock, then free it after dropping the lock. The\ndeferred path should do the same.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39841"
        }
      ],
      "release_date": "2025-09-19T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53229",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nwifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta\nAvoid potential data corruption issues caused by uninitialized driver\nprivate data structures.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53229"
        }
      ],
      "release_date": "2025-09-15T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39817",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\nObserved on kernel 6.6 (present on master as well):\nBUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\nCall trace:\nkasan_check_range+0xe8/0x190\n__asan_loadN+0x1c/0x28\nmemcmp+0x98/0xd0\nefivarfs_d_compare+0x68/0xd8\n__d_lookup_rcu_op_compare+0x178/0x218\n__d_lookup_rcu+0x1f8/0x228\nd_alloc_parallel+0x150/0x648\nlookup_open.isra.0+0x5f0/0x8d0\nopen_last_lookups+0x264/0x828\npath_openat+0x130/0x3f8\ndo_filp_open+0x114/0x248\ndo_sys_openat2+0x340/0x3c0\n__arm64_sys_openat+0x120/0x1a0\nIf dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\nT1T2\nlookup_open\n->lookup\nsimple_lookup\nd_add\n// invalid dentry is added to hash list\nlookup_open\nd_alloc_parallel\n__d_lookup_rcu\n__d_lookup_rcu_op_compare\nhlist_bl_for_each_entry_rcu\n// invalid dentry can be retrieved\n->d_compare\nefivarfs_d_compare\n// oob\nFix it by checking 'guid' before cmp.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39817"
        }
      ],
      "release_date": "2025-09-16T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-56570",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: Filter invalid inodes with missing lookup function\n\nAdd a check to the ovl_dentry_weird() function to prevent the\nprocessing of directory inodes that lack the lookup function.\nThis is important because such inodes can cause errors in overlayfs\nwhen passed to the lowerstack.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56570"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/065bf5dd21639f80e68450de16bda829784dbb8c",
          "url": "https://git.kernel.org/stable/c/065bf5dd21639f80e68450de16bda829784dbb8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f86e79c0b2287ffdabe6c1b305a36c4e0f40fe3",
          "url": "https://git.kernel.org/stable/c/5f86e79c0b2287ffdabe6c1b305a36c4e0f40fe3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72014e7745cc8250bb8f27bd78694dfd3f1b5773",
          "url": "https://git.kernel.org/stable/c/72014e7745cc8250bb8f27bd78694dfd3f1b5773"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/749eac5a6687ec99116e0691d0d71225254654e3",
          "url": "https://git.kernel.org/stable/c/749eac5a6687ec99116e0691d0d71225254654e3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8b359dddb418c60df1a69beea01d1b3322bfe83",
          "url": "https://git.kernel.org/stable/c/c8b359dddb418c60df1a69beea01d1b3322bfe83"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9248e2f73fb4afe08324485e98c815ac084d166",
          "url": "https://git.kernel.org/stable/c/f9248e2f73fb4afe08324485e98c815ac084d166"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff43d008bbf9b27ada434d6455f039a5ef6cee53",
          "url": "https://git.kernel.org/stable/c/ff43d008bbf9b27ada434d6455f039a5ef6cee53"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
        }
      ],
      "release_date": "2024-12-27T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52868",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: core: prevent potential string overflow\n\nThe dev->id value comes from ida_alloc() so it's a number between zero\nand INT_MAX.  If it's too high then these sprintf()s will overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52868"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97",
          "url": "https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb",
          "url": "https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c",
          "url": "https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c",
          "url": "https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521",
          "url": "https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8",
          "url": "https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8",
          "url": "https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5",
          "url": "https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686",
          "url": "https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48695",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b",
          "url": "https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5",
          "url": "https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7",
          "url": "https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16",
          "url": "https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34",
          "url": "https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82",
          "url": "https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6",
          "url": "https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057",
          "url": "https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057"
        }
      ],
      "release_date": "2024-05-03T18:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38621",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stk1160: fix bounds checking in stk1160_copy_video()\n\nThe subtract in this condition is reversed.  The ->length is the length\nof the buffer.  The ->bytesused is how many bytes we have copied thus\nfar.  When the condition is reversed that means the result of the\nsubtraction is always negative but since it's unsigned then the result\nis a very high positive value.  That means the overflow check is never\ntrue.\n\nAdditionally, the ->bytesused doesn't actually work for this purpose\nbecause we're not writing to \"buf->mem + buf->bytesused\".  Instead, the\nmath to calculate the destination where we are writing is a bit\ninvolved.  You calculate the number of full lines already written,\nmultiply by two, skip a line if necessary so that we start on an odd\nnumbered line, and add the offset into the line.\n\nTo fix this buffer overflow, just take the actual destination where we\nare writing, if the offset is already out of bounds print an error and\nreturn.  Otherwise, write up to buf->length bytes.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38621"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd",
          "url": "https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261",
          "url": "https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7",
          "url": "https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52",
          "url": "https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808",
          "url": "https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200",
          "url": "https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a",
          "url": "https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381",
          "url": "https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-06-21T11:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38001",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet_sched: hfsc: Address reentrant enqueue adding class to eltree twice\nSavino says:\n\"We are writing to report that this recent patch\n(141d34391abbb315d68556b7c67ad97885407547) [1]\ncan be bypassed, and a UAF can still occur when HFSC is utilized with\nNETEM.\nThe patch only checks the cl->cl_nactive field to determine whether\nit is the first insertion or not [2], but this field is only\nincremented by init_vf [3].\nBy using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the\ncheck and insert the class twice in the eltree.\nUnder normal conditions, this would lead to an infinite loop in\nhfsc_dequeue for the reasons we already explained in this report [5].\nHowever, if TBF is added as root qdisc and it is configured with a\nvery low rate,\nit can be utilized to prevent packets from being dequeued.\nThis behavior can be exploited to perform subsequent insertions in the\nHFSC eltree and cause a UAF.\"\nTo fix both the UAF and the infinite loop, with netem as an hfsc child,\ncheck explicitly in hfsc_enqueue whether the class is already in the eltree\nwhenever the HFSC_RSC flag is set.\n[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547\n[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572\n[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677\n[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574\n[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38001"
        }
      ],
      "release_date": "2025-06-06T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53322",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: qla2xxx: Wait for io return on terminate rport\nSystem crash due to use after free.\nCurrent code allows terminate_rport_io to exit before making\nsure all IOs has returned. For FCP-2 device, IO's can hang\non in HW because driver has not tear down the session in FW at\nfirst sign of cable pull. When dev_loss_tmo timer pops,\nterminate_rport_io is called and upper layer is about to\nfree various resources. Terminate_rport_io trigger qla to do\nthe final cleanup, but the cleanup might not be fast enough where it\nleave qla still holding on to the same resource.\nWait for IO's to return to upper layer before resources are freed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53322"
        }
      ],
      "release_date": "2025-09-16T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53386",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nBluetooth: Fix potential use-after-free when clear keys\nSimilar to commit c5d2b6fa26b5 (\"Bluetooth: Fix use-after-free in\nhci_remove_ltk/hci_remove_irk\"). We can not access k after kfree_rcu()\ncall.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53386"
        }
      ],
      "release_date": "2025-09-18T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38527",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nsmb: client: fix use-after-free in cifs_oplock_break\nA race condition can occur in cifs_oplock_break() leading to a\nuse-after-free of the cinode structure when unmounting:\ncifs_oplock_break()\n_cifsFileInfo_put(cfile)\ncifsFileInfo_put_final()\ncifs_sb_deactive()\n[last ref, start releasing sb]\nkill_sb()\nkill_anon_super()\ngeneric_shutdown_super()\nevict_inodes()\ndispose_list()\nevict()\ndestroy_inode()\ncall_rcu(&inode->i_rcu, i_callback)\nspin_lock(&cinode->open_file_lock)  <- OK\n[later] i_callback()\ncifs_free_inode()\nkmem_cache_free(cinode)\nspin_unlock(&cinode->open_file_lock)  <- UAF\ncifs_done_oplock_break(cinode)       <- UAF\nThe issue occurs when umount has already released its reference to the\nsuperblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this\nreleases the last reference, triggering the immediate cleanup of all\ninodes under RCU. However, cifs_oplock_break() continues to access the\ncinode after this point, resulting in use-after-free.\nFix this by holding an extra reference to the superblock during the\nentire oplock break operation. This ensures that the superblock and\nits inodes remain valid until the oplock break completes.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38527"
        }
      ],
      "release_date": "2025-08-16T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49935",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/dma-resv: check if the new fence is really later\n\nPreviously when we added a fence to a dma_resv object we always\nassumed the the newer than all the existing fences.\n\nWith Jason's work to add an UAPI to explicit export/import that's not\nnecessary the case any more. So without this check we would allow\nuserspace to force the kernel into an use after free error.\n\nSince the change is very small and defensive it's probably a good\nidea to backport this to stable kernels as well just in case others\nare using the dma_resv object in the same way.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
          "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49935"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3f7c10a269d5b77dd5822ade822643ced3057f0",
          "url": "https://git.kernel.org/stable/c/a3f7c10a269d5b77dd5822ade822643ced3057f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4c798fe98adceb642050819cb57cbc8f5c27870",
          "url": "https://git.kernel.org/stable/c/c4c798fe98adceb642050819cb57cbc8f5c27870"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.4:bpftool-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-cross-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-core-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-debug-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-headers-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-ipaclones-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-extra-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-modules-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-selftests-internal-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:kernel-tools-libs-devel-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64",
            "CentOS-8.4:python3-perf-0:4.18.0-305.25.1.el8_4.tuxcare.els32.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}