{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "net/ieee802154: don't warn zero-sized raw_sendmsg() {CVE-2022-50706}\n- bpf: Don't redirect packets with invalid pkt_len {CVE-2022-49975}\n- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() {CVE-2025-38680}\n- ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network {CVE-2022-49865}\n- scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() {CVE-2023-53676}\n- ring-buffer: Fix deadloop issue on reading trace_pipe {CVE-2023-53668}\n- binfmt_misc: fix shift-out-of-bounds in check_special_flags {CVE-2022-50497}\n- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer {CVE-2025-40269}\n- NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid {CVE-2025-68349}\n- pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}\n- lib: cpu_rmap: Avoid use after free on rmap->obj array entries {CVE-2023-53484}\n- ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}\n- fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702}\n- i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853}\n- fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}\n- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue {CVE-2022-50164}\n- mptcp: fix race condition in mptcp_schedule_work() {CVE-2025-40258}\n- fbdev: bitblit: bound-check glyph index in bit_putcs* {CVE-2025-40322}\n- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}\n- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}\n- HID: intel-ish-hid: ipc: Fix potential use-after-free in work function {CVE-2023-53039}\n- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}\n- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}\n- sched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed {CVE-2022-50103}\n- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() {CVE-2025-38724}\n- xfrm: Duplicate SPI Handling {CVE-2025-39797}\n- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input {CVE-2022-50030}\n- net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent {CVE-2022-48883}\n- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx {CVE-2023-54148}\n- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}\n- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}\n- ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf() {CVE-2022-50050}\n- platform/x86: wmi: Fix opening of char device {CVE-2023-52864}\n- nfs: fix UAF in direct writes {CVE-2024-26958}\n- iomap: iomap: fix memory corruption when recording errors during writeback {CVE-2022-50406}\n- drm/amdkfd: Fix an illegal memory access {CVE-2023-53090}\n- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}\n- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}\n- ALSA: pcm: Fix potential data race at PCM memory allocation helpers {CVE-2023-54072}\n- drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes {CVE-2023-53077}\n- net: bridge: use DEV_STATS_INC() {CVE-2023-52578}\n- i40e: fix idx validation in config queues msg {CVE-2025-39971}\n- loop: Fix use-after-free issues {CVE-2023-53111}\n- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}\n- media: rc: fix races with imon_disconnect() {CVE-2025-39993}\n- fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198}\n- vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}\n- Bluetooth: hci_event: call disconnect callback before deleting conn {CVE-2023-53673}\n- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}\n- pid: take a reference when initializing `cad_pid` {CVE-2021-47118}\n- net: ppp: Add bound checking for skb data on ppp_sync_txmung {CVE-2025-37749}\n- iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid {CVE-2025-37927}\n- tracing: Fix oob write in trace_seq_to_buffer() {CVE-2025-37923}\n- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}\n- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}\n- ALSA: usb-audio: Validate UAC3 power domain descriptors, too {CVE-2025-38729}\n- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285}\n- mac802154: fix llsec key resources release in mac802154_llsec_key_del {CVE-2024-26961}\n- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487}\n- net/mlx5: Discard command completions in internal error {CVE-2024-38555}\n- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}\n- tracing: Fix wild-memory-access in register_synth_event() {CVE-2022-49799}\n- i2c: i801: Don't generate an interrupt on bus reset {CVE-2021-47153}\n- mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update {CVE-2024-35855}\n- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}\n- scsi: qedi: Fix crash while reading debugfs attribute {CVE-2024-40978}\n- kobject_uevent: Fix OOB access within zap_modalias_env() {CVE-2024-42292}\n- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}\n- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}\n- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) {CVE-2022-50093}\n- drm/shmem-helper: Remove another errant put in error path {CVE-2023-53084}\n- wifi: mac80211: Fix UAF in ieee80211_scan_rx() {CVE-2022-49934}\n- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() {CVE-2022-50185}\n- ext4: fix undefined behavior in bit shift for ext4_check_flag_values {CVE-2022-50403}\n- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() {CVE-2022-50279}\n- ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346}\n- nbd: fix incomplete validation of ioctl arg {CVE-2023-53513}\n- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}\n- net: atm: add lec_mutex {CVE-2025-38323}\n- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}\n- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}\n- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}\n- be2net: Fix buffer overflow in be_get_module_eeprom {CVE-2022-49581}\n- isofs: Prevent the use of too small fid {CVE-2025-37780}\n- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping {CVE-2025-40154}\n- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277}\n- drm/amd/display: Check pipe offset before setting vblank {CVE-2024-42120}\n- dm raid: fix accesses beyond end of raid member array {CVE-2022-49674}\n- ftrace: Fix invalid address access in lookup_rec() when index is 0 {CVE-2023-53075}\n- usbnet: Fix linkwatch use-after-free on disconnect {CVE-2022-50220}\n- wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}\n- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}\n- tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). {CVE-2025-39955}\n- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}\n- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}\n- RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug {CVE-2025-38024}\n- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}\n- VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF {CVE-2023-53259}\n- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow {CVE-2023-54102}\n- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device {CVE-2023-54015}\n- perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835}\n- r8169: Fix possible ring buffer corruption on fragmented Tx packets. {CVE-2024-38586}\n- sctp: handle the error returned from sctp_auth_asoc_init_active_key {CVE-2022-50243}\n- net: openvswitch: Fix Use-After-Free in ovs_ct_exit {CVE-2024-27395}\n- media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764}\n- stm class: Fix a double free in stm_register_device() {CVE-2024-38627}\n- leds: trigger: Unregister sysfs attributes before calling deactivate() {CVE-2024-43830}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos8.5els/advisories/2026/clsa-2026_1771077729.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
      }
    ],
    "tracking": {
      "current_release_date": "2026-02-14T14:13:49Z",
      "generator": {
        "date": "2026-02-14T14:13:49Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1771077729",
      "initial_release_date": "2026-02-14T14:13:49Z",
      "revision_history": [
        {
          "date": "2026-02-14T14:13:49Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "kernel: Fix of 107 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 8.5",
                "product": {
                  "name": "Community Enterprise Operating System 8.5",
                  "product_id": "CentOS-8.5",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:8.5:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-tools-libs-devel@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-tools-libs@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-modules-extra@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-modules-internal@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-headers@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-modules@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-tools@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-cross-headers@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-modules-extra@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-devel@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-modules-internal@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/bpftool@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-selftests-internal@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-core@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-devel@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/perf@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-modules@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/python3-perf@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-ipaclones-internal@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-core@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_id": "kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel@4.18.0-348.7.1.el8_5.tuxcare.els34?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64 as a component of Community Enterprise Operating System 8.5",
          "product_id": "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
        "relates_to_product_reference": "CentOS-8.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-54148",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/mlx5e: Move representor neigh cleanup to profile cleanup_tx\nFor IP tunnel encapsulation in ECMP (Equal-Cost Multipath) mode, as\nthe flow is duplicated to the peer eswitch, the related neighbour\ninformation on the peer uplink representor is created as well.\nIn the cited commit, eswitch devcom unpair is moved to uplink unload\nAPI, specifically the profile->cleanup_tx. If there is a encap rule\noffloaded in ECMP mode, when one eswitch does unpair (because of\nunloading the driver, for instance), and the peer rule from the peer\neswitch is going to be deleted, the use-after-free error is triggered\nwhile accessing neigh info, as it is already cleaned up in uplink's\nprofile->disable, which is before its profile->cleanup_tx.\nTo fix this issue, move the neigh cleanup to profile's cleanup_tx\ncallback, and after mlx5e_cleanup_uplink_rep_tx is called. The neigh\ninit is moved to init_tx for symmeter.\n[ 2453.376299] BUG: KASAN: slab-use-after-free in mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.379125] Read of size 4 at addr ffff888127af9008 by task modprobe/2496\n[ 2453.381542] CPU: 7 PID: 2496 Comm: modprobe Tainted: G    B              6.4.0-rc7+ #15\n[ 2453.383386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[ 2453.384335] Call Trace:\n[ 2453.384625]  <TASK>\n[ 2453.384891]  dump_stack_lvl+0x33/0x50\n[ 2453.385285]  print_report+0xc2/0x610\n[ 2453.385667]  ? __virt_addr_valid+0xb1/0x130\n[ 2453.386091]  ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.386757]  kasan_report+0xae/0xe0\n[ 2453.387123]  ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.387798]  mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]\n[ 2453.388465]  mlx5e_rep_encap_entry_detach+0xa6/0xe0 [mlx5_core]\n[ 2453.389111]  mlx5e_encap_dealloc+0xa7/0x100 [mlx5_core]\n[ 2453.389706]  mlx5e_tc_tun_encap_dests_unset+0x61/0xb0 [mlx5_core]\n[ 2453.390361]  mlx5_free_flow_attr_actions+0x11e/0x340 [mlx5_core]\n[ 2453.391015]  ? complete_all+0x43/0xd0\n[ 2453.391398]  ? free_flow_post_acts+0x38/0x120 [mlx5_core]\n[ 2453.392004]  mlx5e_tc_del_fdb_flow+0x4ae/0x690 [mlx5_core]\n[ 2453.392618]  mlx5e_tc_del_fdb_peers_flow+0x308/0x370 [mlx5_core]\n[ 2453.393276]  mlx5e_tc_clean_fdb_peer_flows+0xf5/0x140 [mlx5_core]\n[ 2453.393925]  mlx5_esw_offloads_unpair+0x86/0x540 [mlx5_core]\n[ 2453.394546]  ? mlx5_esw_offloads_set_ns_peer.isra.0+0x180/0x180 [mlx5_core]\n[ 2453.395268]  ? down_write+0xaa/0x100\n[ 2453.395652]  mlx5_esw_offloads_devcom_event+0x203/0x530 [mlx5_core]\n[ 2453.396317]  mlx5_devcom_send_event+0xbb/0x190 [mlx5_core]\n[ 2453.396917]  mlx5_esw_offloads_devcom_cleanup+0xb0/0xd0 [mlx5_core]\n[ 2453.397582]  mlx5e_tc_esw_cleanup+0x42/0x120 [mlx5_core]\n[ 2453.398182]  mlx5e_rep_tc_cleanup+0x15/0x30 [mlx5_core]\n[ 2453.398768]  mlx5e_cleanup_rep_tx+0x6c/0x80 [mlx5_core]\n[ 2453.399367]  mlx5e_detach_netdev+0xee/0x120 [mlx5_core]\n[ 2453.399957]  mlx5e_netdev_change_profile+0x84/0x170 [mlx5_core]\n[ 2453.400598]  mlx5e_vport_rep_unload+0xe0/0xf0 [mlx5_core]\n[ 2453.403781]  mlx5_eswitch_unregister_vport_reps+0x15e/0x190 [mlx5_core]\n[ 2453.404479]  ? mlx5_eswitch_register_vport_reps+0x200/0x200 [mlx5_core]\n[ 2453.405170]  ? up_write+0x39/0x60\n[ 2453.405529]  ? kernfs_remove_by_name_ns+0xb7/0xe0\n[ 2453.405985]  auxiliary_bus_remove+0x2e/0x40\n[ 2453.406405]  device_release_driver_internal+0x243/0x2d0\n[ 2453.406900]  ? kobject_put+0x42/0x2d0\n[ 2453.407284]  bus_remove_device+0x128/0x1d0\n[ 2453.407687]  device_del+0x240/0x550\n[ 2453.408053]  ? waiting_for_supplier_show+0xe0/0xe0\n[ 2453.408511]  ? kobject_put+0xfa/0x2d0\n[ 2453.408889]  ? __kmem_cache_free+0x14d/0x280\n[ 2453.409310]  mlx5_rescan_drivers_locked.part.0+0xcd/0x2b0 [mlx5_core]\n[ 2453.409973]  mlx5_unregister_device+0x40/0x50 [mlx5_core]\n[ 2453.410561]  mlx5_uninit_one+0x3d/0x110 [mlx5_core]\n[ 2453.411111]  remove_one+0x89/0x130 [mlx5_core]\n[ 24\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-54148"
        }
      ],
      "release_date": "2025-12-24T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-43830",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: trigger: Unregister sysfs attributes before calling deactivate()\n\nTriggers which have trigger specific sysfs attributes typically store\nrelated data in trigger-data allocated by the activate() callback and\nfreed by the deactivate() callback.\n\nCalling device_remove_groups() after calling deactivate() leaves a window\nwhere the sysfs attributes show/store functions could be called after\ndeactivation and then operate on the just freed trigger-data.\n\nMove the device_remove_groups() call to before deactivate() to close\nthis race window.\n\nThis also makes the deactivation path properly do things in reverse order\nof the activation path which calls the activate() callback before calling\ndevice_add_groups().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-43830"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0788a6f3523d3686a9eed5ea1e6fcce6841277b2",
          "url": "https://git.kernel.org/stable/c/0788a6f3523d3686a9eed5ea1e6fcce6841277b2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09c1583f0e10c918855d6e7540a79461a353e5d6",
          "url": "https://git.kernel.org/stable/c/09c1583f0e10c918855d6e7540a79461a353e5d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3fb6a9d67cfd812a547ac73ec02e1077c26c640d",
          "url": "https://git.kernel.org/stable/c/3fb6a9d67cfd812a547ac73ec02e1077c26c640d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/734ba6437e80dfc780e9ee9d95f912392d12b5ea",
          "url": "https://git.kernel.org/stable/c/734ba6437e80dfc780e9ee9d95f912392d12b5ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0dc9adf9474ecb7106e60e5472577375aedaed3",
          "url": "https://git.kernel.org/stable/c/c0dc9adf9474ecb7106e60e5472577375aedaed3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3b7a650c8717aa89df318364609c86cbc040156",
          "url": "https://git.kernel.org/stable/c/c3b7a650c8717aa89df318364609c86cbc040156"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374",
          "url": "https://git.kernel.org/stable/c/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1415125b701ef13370e2761f691ec632a5eb93a",
          "url": "https://git.kernel.org/stable/c/d1415125b701ef13370e2761f691ec632a5eb93a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-08-17T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50706",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/ieee802154: don't warn zero-sized raw_sendmsg()\nsyzbot is hitting skb_assert_len() warning at __dev_queue_xmit() [1],\nfor PF_IEEE802154 socket's zero-sized raw_sendmsg() request is hitting\n__dev_queue_xmit() with skb->len == 0.\nSince PF_IEEE802154 socket's zero-sized raw_sendmsg() request was\nable to return 0, don't call __dev_queue_xmit() if packet length is 0.\n----------\n#include <sys/socket.h>\n#include <netinet/in.h>\nint main(int argc, char *argv[])\n{\nstruct sockaddr_in addr = { .sin_family = AF_INET, .sin_addr.s_addr = htonl(INADDR_LOOPBACK) };\nstruct iovec iov = { };\nstruct msghdr hdr = { .msg_name = &addr, .msg_namelen = sizeof(addr), .msg_iov = &iov, .msg_iovlen = 1 };\nsendmsg(socket(PF_IEEE802154, SOCK_RAW, 0), &hdr, 0);\nreturn 0;\n}\n----------\nNote that this might be a sign that commit fd1894224407c484 (\"bpf: Don't\nredirect packets with invalid pkt_len\") should be reverted, for\nskb->len == 0 was acceptable for at least PF_IEEE802154 socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50706"
        }
      ],
      "release_date": "2025-12-24T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-38724",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n\nLei Lu recently reported that nfsd4_setclientid_confirm() did not check\nthe return value from get_client_locked(). a SETCLIENTID_CONFIRM could\nrace with a confirmed client expiring and fail to get a reference. That\ncould later lead to a UAF.\n\nFix this by getting a reference early in the case where there is an\nextant confirmed client. If that fails then treat it as if there were no\nconfirmed client found at all.\n\nIn the case where the unconfirmed client is expiring, just fail and\nreturn the result from get_client_locked().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38724"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1",
          "url": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3",
          "url": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d",
          "url": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1",
          "url": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306",
          "url": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68",
          "url": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b",
          "url": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
          "url": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0",
          "url": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52764",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker\n\nSyzkaller reported the following issue:\nUBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27\nshift exponent 245 is too large for 32-bit type 'int'\n\nWhen the value of the variable \"sd->params.exposure.gain\" exceeds the\nnumber of bits in an integer, a shift-out-of-bounds error is reported. It\nis triggered because the variable \"currentexp\" cannot be left-shifted by\nmore than the number of bits in an integer. In order to avoid invalid\nrange during left-shift, the conditional expression is added.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52764"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953",
          "url": "https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26",
          "url": "https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb",
          "url": "https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060",
          "url": "https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b",
          "url": "https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809",
          "url": "https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177",
          "url": "https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a",
          "url": "https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3",
          "url": "https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53075",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix invalid address access in lookup_rec() when index is 0\n\nKASAN reported follow problem:\n\n BUG: KASAN: use-after-free in lookup_rec\n Read of size 8 at addr ffff000199270ff0 by task modprobe\n CPU: 2 Comm: modprobe\n Call trace:\n  kasan_report\n  __asan_load8\n  lookup_rec\n  ftrace_location\n  arch_check_ftrace_location\n  check_kprobe_address_safe\n  register_kprobe\n\nWhen checking pg->records[pg->index - 1].ip in lookup_rec(), it can get a\npg which is newly added to ftrace_pages_start in ftrace_process_locs().\nBefore the first pg->index++, index is 0 and accessing pg->records[-1].ip\nwill cause this problem.\n\nDon't check the ip when pg->index is 0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53075"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a0d71fabfeb349216d33f001a6421b1768bd3a9",
          "url": "https://git.kernel.org/stable/c/2a0d71fabfeb349216d33f001a6421b1768bd3a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2de28e5ce34b22b73b833a21e2c45ae3aade3964",
          "url": "https://git.kernel.org/stable/c/2de28e5ce34b22b73b833a21e2c45ae3aade3964"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4f84f31f63416b0f02fc146ffdc4ab32723eb7e8",
          "url": "https://git.kernel.org/stable/c/4f84f31f63416b0f02fc146ffdc4ab32723eb7e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7569ee04b0e3b32df79f64db3a7138573edad9bc",
          "url": "https://git.kernel.org/stable/c/7569ee04b0e3b32df79f64db3a7138573edad9bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83c3b2f4e7c61367c7b24551f4c6eb94bbdda283",
          "url": "https://git.kernel.org/stable/c/83c3b2f4e7c61367c7b24551f4c6eb94bbdda283"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac58b88ccbbb8e9fb83e137cee04a856b1ea6635",
          "url": "https://git.kernel.org/stable/c/ac58b88ccbbb8e9fb83e137cee04a856b1ea6635"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee92fa443358f4fc0017c1d0d325c27b37802504",
          "url": "https://git.kernel.org/stable/c/ee92fa443358f4fc0017c1d0d325c27b37802504"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1bd8b7fd890d87d0dc4dedc6287ea34dd07c0b4",
          "url": "https://git.kernel.org/stable/c/f1bd8b7fd890d87d0dc4dedc6287ea34dd07c0b4"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50050",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()\n\nsnprintf() returns the would-be-filled size when the string overflows\nthe given buffer size, hence using this value may result in the buffer\noverflow (although it's unrealistic).\n\nThis patch replaces with a safer version, scnprintf() for papering\nover such a potential issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50050"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ee1310f4d148dbf04c4159b88afd0b941018903",
          "url": "https://git.kernel.org/stable/c/6ee1310f4d148dbf04c4159b88afd0b941018903"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94c1ceb043c1a002de9649bb630c8e8347645982",
          "url": "https://git.kernel.org/stable/c/94c1ceb043c1a002de9649bb630c8e8347645982"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7915c5614a7ece117ec390f21a410531eac48de",
          "url": "https://git.kernel.org/stable/c/f7915c5614a7ece117ec390f21a410531eac48de"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53084",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/shmem-helper: Remove another errant put in error path\n\ndrm_gem_shmem_mmap() doesn't own reference in error code path, resulting\nin the dma-buf shmem GEM object getting prematurely freed leading to a\nlater use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53084"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5cfb617967b05f8f27e862c97db1fabd8485f4db",
          "url": "https://git.kernel.org/stable/c/5cfb617967b05f8f27e862c97db1fabd8485f4db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/684c7372bbd6447c2e86a2a84e97a1478604d21f",
          "url": "https://git.kernel.org/stable/c/684c7372bbd6447c2e86a2a84e97a1478604d21f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/77d26c824aa5a7e0681ef1d5b75fe538d746addc",
          "url": "https://git.kernel.org/stable/c/77d26c824aa5a7e0681ef1d5b75fe538d746addc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dede8c14a37a7ac458f9add56154a074ed78e7cf",
          "url": "https://git.kernel.org/stable/c/dede8c14a37a7ac458f9add56154a074ed78e7cf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee9adb7a45516cfa536ca92253d7ae59d56db9e4",
          "url": "https://git.kernel.org/stable/c/ee9adb7a45516cfa536ca92253d7ae59d56db9e4"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50243",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: handle the error returned from sctp_auth_asoc_init_active_key\n\nWhen it returns an error from sctp_auth_asoc_init_active_key(), the\nactive_key is actually not updated. The old sh_key will be freeed\nwhile it's still used as active key in asoc. Then an use-after-free\nwill be triggered when sending patckets, as found by syzbot:\n\n  sctp_auth_shkey_hold+0x22/0xa0 net/sctp/auth.c:112\n  sctp_set_owner_w net/sctp/socket.c:132 [inline]\n  sctp_sendmsg_to_asoc+0xbd5/0x1a20 net/sctp/socket.c:1863\n  sctp_sendmsg+0x1053/0x1d50 net/sctp/socket.c:2025\n  inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:819\n  sock_sendmsg_nosec net/socket.c:714 [inline]\n  sock_sendmsg+0xcf/0x120 net/socket.c:734\n\nThis patch is to fix it by not replacing the sh_key when it returns\nerrors from sctp_auth_asoc_init_active_key() in sctp_auth_set_key().\nFor sctp_auth_set_active_key(), old active_key_id will be set back\nto asoc->active_key_id when the same thing happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50243"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/022152aaebe116a25c39818a07e175a8cd3c1e11",
          "url": "https://git.kernel.org/stable/c/022152aaebe116a25c39818a07e175a8cd3c1e11"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f90099d18e3abdc01babf686f41f63fe04939c1",
          "url": "https://git.kernel.org/stable/c/0f90099d18e3abdc01babf686f41f63fe04939c1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19d636b663e0e92951bba5fced929ca7fd25c552",
          "url": "https://git.kernel.org/stable/c/19d636b663e0e92951bba5fced929ca7fd25c552"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/382ff44716603a54f5fd238ddec6a2468e217612",
          "url": "https://git.kernel.org/stable/c/382ff44716603a54f5fd238ddec6a2468e217612"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b0fcf5e29c0940e1169ce9c44f73edd98bdf12d",
          "url": "https://git.kernel.org/stable/c/3b0fcf5e29c0940e1169ce9c44f73edd98bdf12d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8fa99a3a11bdd77fef6b4a97f1021eb30b5ba40",
          "url": "https://git.kernel.org/stable/c/b8fa99a3a11bdd77fef6b4a97f1021eb30b5ba40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f65955340e0044f5c41ac799a01698ac7dee8a4e",
          "url": "https://git.kernel.org/stable/c/f65955340e0044f5c41ac799a01698ac7dee8a4e"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49799",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix wild-memory-access in register_synth_event()\n\nIn register_synth_event(), if set_synth_event_print_fmt() failed, then\nboth trace_remove_event_call() and unregister_trace_event() will be\ncalled, which means the trace_event_call will call\n__unregister_trace_event() twice. As the result, the second unregister\nwill causes the wild-memory-access.\n\nregister_synth_event\n    set_synth_event_print_fmt failed\n    trace_remove_event_call\n        event_remove\n            if call->event.funcs then\n            __unregister_trace_event (first call)\n    unregister_trace_event\n        __unregister_trace_event (second call)\n\nFix the bug by avoiding to call the second __unregister_trace_event() by\nchecking if the first one is called.\n\ngeneral protection fault, probably for non-canonical address\n\t0xfbd59c0000000024: 0000 [#1] SMP KASAN PTI\nKASAN: maybe wild-memory-access in range\n[0xdead000000000120-0xdead000000000127]\nCPU: 0 PID: 3807 Comm: modprobe Not tainted\n6.1.0-rc1-00186-g76f33a7eedb4 #299\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nrel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\nRIP: 0010:unregister_trace_event+0x6e/0x280\nCode: 00 fc ff df 4c 89 ea 48 c1 ea 03 80 3c 02 00 0f 85 0e 02 00 00 48\nb8 00 00 00 00 00 fc ff df 4c 8b 63 08 4c 89 e2 48 c1 ea 03 <80> 3c 02\n00 0f 85 e2 01 00 00 49 89 2c 24 48 85 ed 74 28 e8 7a 9b\nRSP: 0018:ffff88810413f370 EFLAGS: 00010a06\nRAX: dffffc0000000000 RBX: ffff888105d050b0 RCX: 0000000000000000\nRDX: 1bd5a00000000024 RSI: ffff888119e276e0 RDI: ffffffff835a8b20\nRBP: dead000000000100 R08: 0000000000000000 R09: fffffbfff0913481\nR10: ffffffff8489a407 R11: fffffbfff0913480 R12: dead000000000122\nR13: ffff888105d050b8 R14: 0000000000000000 R15: ffff888105d05028\nFS:  00007f7823e8d540(0000) GS:ffff888119e00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f7823e7ebec CR3: 000000010a058002 CR4: 0000000000330ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n __create_synth_event+0x1e37/0x1eb0\n create_or_delete_synth_event+0x110/0x250\n synth_event_run_command+0x2f/0x110\n test_gen_synth_cmd+0x170/0x2eb [synth_event_gen_test]\n synth_event_gen_test_init+0x76/0x9bc [synth_event_gen_test]\n do_one_initcall+0xdb/0x480\n do_init_module+0x1cf/0x680\n load_module+0x6a50/0x70a0\n __do_sys_finit_module+0x12f/0x1c0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49799"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b5f1c34d3f5a664a57a5a7557a50e4e3cc2505c",
          "url": "https://git.kernel.org/stable/c/1b5f1c34d3f5a664a57a5a7557a50e4e3cc2505c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/315b149f08229a233d47532eb5da1707b28f764c",
          "url": "https://git.kernel.org/stable/c/315b149f08229a233d47532eb5da1707b28f764c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6517b97134f724d12f673f9fb4f456d75c7a905f",
          "url": "https://git.kernel.org/stable/c/6517b97134f724d12f673f9fb4f456d75c7a905f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a5bfa53e5036b3e7a80be902dd3719a930accabd",
          "url": "https://git.kernel.org/stable/c/a5bfa53e5036b3e7a80be902dd3719a930accabd"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49674",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix accesses beyond end of raid member array\n\nOn dm-raid table load (using raid_ctr), dm-raid allocates an array\nrs->devs[rs->raid_disks] for the raid device members. rs->raid_disks\nis defined by the number of raid metadata and image tupples passed\ninto the target's constructor.\n\nIn the case of RAID layout changes being requested, that number can be\ndifferent from the current number of members for existing raid sets as\ndefined in their superblocks. Example RAID layout changes include:\n- raid1 legs being added/removed\n- raid4/5/6/10 number of stripes changed (stripe reshaping)\n- takeover to higher raid level (e.g. raid5 -> raid6)\n\nWhen accessing array members, rs->raid_disks must be used in control\nloops instead of the potentially larger value in rs->md.raid_disks.\nOtherwise it will cause memory access beyond the end of the rs->devs\narray.\n\nFix this by changing code that is prone to out-of-bounds access.\nAlso fix validate_raid_redundancy() to validate all devices that are\nadded. Also, use braces to help clean up raid_iterate_devices().\n\nThe out-of-bounds memory accesses was discovered using KASAN.\n\nThis commit was verified to pass all LVM2 RAID tests (with KASAN\nenabled).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49674"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/332bd0778775d0cf105c4b9e03e460b590749916",
          "url": "https://git.kernel.org/stable/c/332bd0778775d0cf105c4b9e03e460b590749916"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e161a8826b63c0b8b43e4a7fad1f956780f42ab",
          "url": "https://git.kernel.org/stable/c/5e161a8826b63c0b8b43e4a7fad1f956780f42ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6352b2f4d8e95ec0ae576d7705435d64cfa29503",
          "url": "https://git.kernel.org/stable/c/6352b2f4d8e95ec0ae576d7705435d64cfa29503"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90de15357504c8097ab29769dc6852e16281e9e8",
          "url": "https://git.kernel.org/stable/c/90de15357504c8097ab29769dc6852e16281e9e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9bf2b0757b04c78dc5d6e3a198acca98457b32a1",
          "url": "https://git.kernel.org/stable/c/9bf2b0757b04c78dc5d6e3a198acca98457b32a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bcff98500ea3b4e7615ec31d2bdd326bc1ef5134",
          "url": "https://git.kernel.org/stable/c/bcff98500ea3b4e7615ec31d2bdd326bc1ef5134"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df1a5ab0dd0775f2ea101c71f2addbc4c0ea0f85",
          "url": "https://git.kernel.org/stable/c/df1a5ab0dd0775f2ea101c71f2addbc4c0ea0f85"
        }
      ],
      "release_date": "2025-02-26T07:01:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50103",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed\n\nWith cgroup v2, the cpuset's cpus_allowed mask can be empty indicating\nthat the cpuset will just use the effective CPUs of its parent. So\ncpuset_can_attach() can call task_can_attach() with an empty mask.\nThis can lead to cpumask_any_and() returns nr_cpu_ids causing the call\nto dl_bw_of() to crash due to percpu value access of an out of bound\nCPU value. For example:\n\n\t[80468.182258] BUG: unable to handle page fault for address: ffffffff8b6648b0\n\t  :\n\t[80468.191019] RIP: 0010:dl_cpu_busy+0x30/0x2b0\n\t  :\n\t[80468.207946] Call Trace:\n\t[80468.208947]  cpuset_can_attach+0xa0/0x140\n\t[80468.209953]  cgroup_migrate_execute+0x8c/0x490\n\t[80468.210931]  cgroup_update_dfl_csses+0x254/0x270\n\t[80468.211898]  cgroup_subtree_control_write+0x322/0x400\n\t[80468.212854]  kernfs_fop_write_iter+0x11c/0x1b0\n\t[80468.213777]  new_sync_write+0x11f/0x1b0\n\t[80468.214689]  vfs_write+0x1eb/0x280\n\t[80468.215592]  ksys_write+0x5f/0xe0\n\t[80468.216463]  do_syscall_64+0x5c/0x80\n\t[80468.224287]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nFix that by using effective_cpus instead. For cgroup v1, effective_cpus\nis the same as cpus_allowed. For v2, effective_cpus is the real cpumask\nto be used by tasks within the cpuset anyway.\n\nAlso update task_can_attach()'s 2nd argument name to cs_effective_cpus to\nreflect the change. In addition, a check is added to task_can_attach()\nto guard against the possibility that cpumask_any_and() may return a\nvalue >= nr_cpu_ids.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50103"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/147f66d22f58712dce7ccdd6a1f6cb3ee8042df4",
          "url": "https://git.kernel.org/stable/c/147f66d22f58712dce7ccdd6a1f6cb3ee8042df4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/336626564b58071b8980a4e6a31a8f5d92705d9b",
          "url": "https://git.kernel.org/stable/c/336626564b58071b8980a4e6a31a8f5d92705d9b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/357f3f0e522a6ce1ce4a571cb780d9861d53bec7",
          "url": "https://git.kernel.org/stable/c/357f3f0e522a6ce1ce4a571cb780d9861d53bec7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b6e8d40d43ae4dec00c8fea2593eeea3114b8f44",
          "url": "https://git.kernel.org/stable/c/b6e8d40d43ae4dec00c8fea2593eeea3114b8f44"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f56607b44c9896e51678a7e8cdd3a5479f4b4548",
          "url": "https://git.kernel.org/stable/c/f56607b44c9896e51678a7e8cdd3a5479f4b4548"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38245",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().\n\nsyzbot reported a warning below during atm_dev_register(). [0]\n\nBefore creating a new device and procfs/sysfs for it, atm_dev_register()\nlooks up a duplicated device by __atm_dev_lookup().  These operations are\ndone under atm_dev_mutex.\n\nHowever, when removing a device in atm_dev_deregister(), it releases the\nmutex just after removing the device from the list that __atm_dev_lookup()\niterates over.\n\nSo, there will be a small race window where the device does not exist on\nthe device list but procfs/sysfs are still not removed, triggering the\nsplat.\n\nLet's hold the mutex until procfs/sysfs are removed in\natm_dev_deregister().\n\n[0]:\nproc_dir_entry 'atm/atmtcp:0' already registered\nWARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377\nModules linked in:\nCPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nRIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377\nCode: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 <0f> 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48\nRSP: 0018:ffffc9000466fa30 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248\nRDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001\nRBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140\nR13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444\nFS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n proc_create_data+0xbe/0x110 fs/proc/generic.c:585\n atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361\n atm_dev_register+0x46d/0x890 net/atm/resources.c:113\n atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369\n atmtcp_attach drivers/atm/atmtcp.c:403 [inline]\n atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x115/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f38b3b74459\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459\nRDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005\nRBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f\nR10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac\nR13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38245"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c",
          "url": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439",
          "url": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec",
          "url": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a",
          "url": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c",
          "url": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4",
          "url": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e",
          "url": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896",
          "url": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47118",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: take a reference when initializing `cad_pid`\n\nDuring boot, kernel_init_freeable() initializes `cad_pid` to the init\ntask's struct pid.  Later on, we may change `cad_pid` via a sysctl, and\nwhen this happens proc_do_cad_pid() will increment the refcount on the\nnew pid via get_pid(), and will decrement the refcount on the old pid\nvia put_pid().  As we never called get_pid() when we initialized\n`cad_pid`, we decrement a reference we never incremented, can therefore\nfree the init task's struct pid early.  As there can be dangling\nreferences to the struct pid, we can later encounter a use-after-free\n(e.g.  when delivering signals).\n\nThis was spotted when fuzzing v5.13-rc3 with Syzkaller, but seems to\nhave been around since the conversion of `cad_pid` to struct pid in\ncommit 9ec52099e4b8 (\"[PATCH] replace cad_pid by a struct pid\") from the\npre-KASAN stone age of v2.6.19.\n\nFix this by getting a reference to the init task's struct pid when we\nassign it to `cad_pid`.\n\nFull KASAN splat below.\n\n   ==================================================================\n   BUG: KASAN: use-after-free in ns_of_pid include/linux/pid.h:153 [inline]\n   BUG: KASAN: use-after-free in task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n   Read of size 4 at addr ffff23794dda0004 by task syz-executor.0/273\n\n   CPU: 1 PID: 273 Comm: syz-executor.0 Not tainted 5.12.0-00001-g9aef892b2d15 #1\n   Hardware name: linux,dummy-virt (DT)\n   Call trace:\n    ns_of_pid include/linux/pid.h:153 [inline]\n    task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n    do_notify_parent+0x308/0xe60 kernel/signal.c:1950\n    exit_notify kernel/exit.c:682 [inline]\n    do_exit+0x2334/0x2bd0 kernel/exit.c:845\n    do_group_exit+0x108/0x2c8 kernel/exit.c:922\n    get_signal+0x4e4/0x2a88 kernel/signal.c:2781\n    do_signal arch/arm64/kernel/signal.c:882 [inline]\n    do_notify_resume+0x300/0x970 arch/arm64/kernel/signal.c:936\n    work_pending+0xc/0x2dc\n\n   Allocated by task 0:\n    slab_post_alloc_hook+0x50/0x5c0 mm/slab.h:516\n    slab_alloc_node mm/slub.c:2907 [inline]\n    slab_alloc mm/slub.c:2915 [inline]\n    kmem_cache_alloc+0x1f4/0x4c0 mm/slub.c:2920\n    alloc_pid+0xdc/0xc00 kernel/pid.c:180\n    copy_process+0x2794/0x5e18 kernel/fork.c:2129\n    kernel_clone+0x194/0x13c8 kernel/fork.c:2500\n    kernel_thread+0xd4/0x110 kernel/fork.c:2552\n    rest_init+0x44/0x4a0 init/main.c:687\n    arch_call_rest_init+0x1c/0x28\n    start_kernel+0x520/0x554 init/main.c:1064\n    0x0\n\n   Freed by task 270:\n    slab_free_hook mm/slub.c:1562 [inline]\n    slab_free_freelist_hook+0x98/0x260 mm/slub.c:1600\n    slab_free mm/slub.c:3161 [inline]\n    kmem_cache_free+0x224/0x8e0 mm/slub.c:3177\n    put_pid.part.4+0xe0/0x1a8 kernel/pid.c:114\n    put_pid+0x30/0x48 kernel/pid.c:109\n    proc_do_cad_pid+0x190/0x1b0 kernel/sysctl.c:1401\n    proc_sys_call_handler+0x338/0x4b0 fs/proc/proc_sysctl.c:591\n    proc_sys_write+0x34/0x48 fs/proc/proc_sysctl.c:617\n    call_write_iter include/linux/fs.h:1977 [inline]\n    new_sync_write+0x3ac/0x510 fs/read_write.c:518\n    vfs_write fs/read_write.c:605 [inline]\n    vfs_write+0x9c4/0x1018 fs/read_write.c:585\n    ksys_write+0x124/0x240 fs/read_write.c:658\n    __do_sys_write fs/read_write.c:670 [inline]\n    __se_sys_write fs/read_write.c:667 [inline]\n    __arm64_sys_write+0x78/0xb0 fs/read_write.c:667\n    __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]\n    invoke_syscall arch/arm64/kernel/syscall.c:49 [inline]\n    el0_svc_common.constprop.1+0x16c/0x388 arch/arm64/kernel/syscall.c:129\n    do_el0_svc+0xf8/0x150 arch/arm64/kernel/syscall.c:168\n    el0_svc+0x28/0x38 arch/arm64/kernel/entry-common.c:416\n    el0_sync_handler+0x134/0x180 arch/arm64/kernel/entry-common.c:432\n    el0_sync+0x154/0x180 arch/arm64/kernel/entry.S:701\n\n   The buggy address belongs to the object at ffff23794dda0000\n    which belongs to the cache pid of size 224\n   The buggy address is located 4 bytes inside of\n    224-byte region [ff\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47118"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f",
          "url": "https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff",
          "url": "https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788",
          "url": "https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6",
          "url": "https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529",
          "url": "https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca",
          "url": "https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414",
          "url": "https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4",
          "url": "https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4"
        }
      ],
      "release_date": "2024-03-15T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26872",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Do not register event handler until srpt device is fully setup\n\nUpon rare occasions, KASAN reports a use-after-free Write\nin srpt_refresh_port().\n\nThis seems to be because an event handler is registered before the\nsrpt device is fully setup and a race condition upon error may leave a\npartially setup event handler in place.\n\nInstead, only register the event handler after srpt device initialization\nis complete.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26872"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090",
          "url": "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346",
          "url": "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217",
          "url": "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5",
          "url": "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456",
          "url": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6",
          "url": "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f",
          "url": "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        }
      ],
      "release_date": "2024-04-17T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53077",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes\n\n[WHY]\nWhen PTEBufferSizeInRequests is zero, UBSAN reports the following\nwarning because dml_log2 returns an unexpected negative value:\n\n  shift exponent 4294966273 is too large for 32-bit type 'int'\n\n[HOW]\n\nIn the case PTEBufferSizeInRequests is zero, skip the dml_log2() and\nassign the result directly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53077"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/031f196d1b1b6d5dfcb0533b431e3ab1750e6189",
          "url": "https://git.kernel.org/stable/c/031f196d1b1b6d5dfcb0533b431e3ab1750e6189"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7257070be70e19a9138f39009c1a26c83a8a7cfa",
          "url": "https://git.kernel.org/stable/c/7257070be70e19a9138f39009c1a26c83a8a7cfa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a16394b5d661afec9a264fecac3abd87aea439ea",
          "url": "https://git.kernel.org/stable/c/a16394b5d661afec9a264fecac3abd87aea439ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bec1bea2fa974e63f6059c33edde669c7894d0bc",
          "url": "https://git.kernel.org/stable/c/bec1bea2fa974e63f6059c33edde669c7894d0bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e12b95680821b9880cd9992c0f3555389363604f",
          "url": "https://git.kernel.org/stable/c/e12b95680821b9880cd9992c0f3555389363604f"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50185",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()\n\nThe last case label can write two buffers 'mc_reg_address[j]' and\n'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE\nsince there are no checks for this value in both case labels after the\nlast 'j++'.\n\nInstead of changing '>' to '>=' there, add the bounds check at the start\nof the second 'case' (the first one already has it).\n\nAlso, remove redundant last checks for 'j' index bigger than array size.\nThe expression is always false. Moreover, before or after the patch\n'table->last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it\nseems it can be a valid value.\n\nDetected using the static analysis tool - Svace.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50185"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/136f614931a2bb73616b292cf542da3a18daefd5",
          "url": "https://git.kernel.org/stable/c/136f614931a2bb73616b292cf542da3a18daefd5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f341053852be76f82610ce47a505d930512f05c",
          "url": "https://git.kernel.org/stable/c/1f341053852be76f82610ce47a505d930512f05c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/782e413e38dffd37cc85b08b1ccb982adb4a93ce",
          "url": "https://git.kernel.org/stable/c/782e413e38dffd37cc85b08b1ccb982adb4a93ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8508d6d23a247c29792ce2fc0df3f3404d6a6a80",
          "url": "https://git.kernel.org/stable/c/8508d6d23a247c29792ce2fc0df3f3404d6a6a80"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9faff03617afeced1c4e5daa89e79b3906374342",
          "url": "https://git.kernel.org/stable/c/9faff03617afeced1c4e5daa89e79b3906374342"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db1a9add3f90ff1c641974d5bb910c16b87af4ef",
          "url": "https://git.kernel.org/stable/c/db1a9add3f90ff1c641974d5bb910c16b87af4ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/deb603c5928e546609c0d5798e231d0205748943",
          "url": "https://git.kernel.org/stable/c/deb603c5928e546609c0d5798e231d0205748943"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea73869df6ef386fc0feeb28ff66742ca835b18f",
          "url": "https://git.kernel.org/stable/c/ea73869df6ef386fc0feeb28ff66742ca835b18f"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52864",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: wmi: Fix opening of char device\n\nSince commit fa1f68db6ca7 (\"drivers: misc: pass miscdevice pointer via\nfile private data\"), the miscdevice stores a pointer to itself inside\nfilp->private_data, which means that private_data will not be NULL when\nwmi_char_open() is called. This might cause memory corruption should\nwmi_char_open() be unable to find its driver, something which can\nhappen when the associated WMI device is deleted in wmi_free_devices().\n\nFix the problem by using the miscdevice pointer to retrieve the WMI\ndevice data associated with a char device using container_of(). This\nalso avoids wmi_char_open() picking a wrong WMI device bound to a\ndriver with the same name as the original driver.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52864"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e",
          "url": "https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44a96796d25809502c75771d40ee693c2e44724e",
          "url": "https://git.kernel.org/stable/c/44a96796d25809502c75771d40ee693c2e44724e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203",
          "url": "https://git.kernel.org/stable/c/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf098e937dd125c0317a0d6f261ac2a950a233d6",
          "url": "https://git.kernel.org/stable/c/cf098e937dd125c0317a0d6f261ac2a950a233d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d426a2955e45a95b2282764105fcfb110a540453",
          "url": "https://git.kernel.org/stable/c/d426a2955e45a95b2282764105fcfb110a540453"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0bf076b734a2fab92d8fddc2b8b03462eee7097",
          "url": "https://git.kernel.org/stable/c/e0bf076b734a2fab92d8fddc2b8b03462eee7097"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eba9ac7abab91c8f6d351460239108bef5e7a0b6",
          "url": "https://git.kernel.org/stable/c/eba9ac7abab91c8f6d351460239108bef5e7a0b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3",
          "url": "https://git.kernel.org/stable/c/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52578",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: use DEV_STATS_INC()\n\nsyzbot/KCSAN reported data-races in br_handle_frame_finish() [1]\nThis function can run from multiple cpus without mutual exclusion.\n\nAdopt SMP safe DEV_STATS_INC() to update dev->stats fields.\n\nHandles updates to dev->stats.tx_dropped while we are at it.\n\n[1]\nBUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 1:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\nrun_ksoftirqd+0x17/0x20 kernel/softirq.c:921\nsmpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nread-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 0:\nbr_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189\nbr_nf_hook_thresh+0x1ed/0x220\nbr_nf_pre_routing_finish_ipv6+0x50f/0x540\nNF_HOOK include/linux/netfilter.h:304 [inline]\nbr_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178\nbr_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508\nnf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]\nnf_hook_bridge_pre net/bridge/br_input.c:272 [inline]\nbr_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417\n__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417\n__netif_receive_skb_one_core net/core/dev.c:5521 [inline]\n__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637\nprocess_backlog+0x21f/0x380 net/core/dev.c:5965\n__napi_poll+0x60/0x3b0 net/core/dev.c:6527\nnapi_poll net/core/dev.c:6594 [inline]\nnet_rx_action+0x32b/0x750 net/core/dev.c:6727\n__do_softirq+0xc1/0x265 kernel/softirq.c:553\ndo_softirq+0x5e/0x90 kernel/softirq.c:454\n__local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381\n__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]\n_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210\nspin_unlock_bh include/linux/spinlock.h:396 [inline]\nbatadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1356\nbatadv_tt_purge+0x2b/0x630 net/batman-adv/translation-table.c:3560\nprocess_one_work kernel/workqueue.c:2630 [inline]\nprocess_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2703\nworker_thread+0x525/0x730 kernel/workqueue.c:2784\nkthread+0x1d7/0x210 kernel/kthread.c:388\nret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147\nret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304\n\nvalue changed: 0x00000000000d7190 -> 0x00000000000d7191\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 14848 Comm: kworker/u4:11 Not tainted 6.6.0-rc1-syzkaller-00236-gad8a69f361b9 #0",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52578"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd",
          "url": "https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4",
          "url": "https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2",
          "url": "https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394",
          "url": "https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5",
          "url": "https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839",
          "url": "https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa",
          "url": "https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa"
        }
      ],
      "release_date": "2024-03-02T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-42292",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkobject_uevent: Fix OOB access within zap_modalias_env()\n\nzap_modalias_env() wrongly calculates size of memory block to move, so\nwill cause OOB memory access issue if variable MODALIAS is not the last\none within its @env parameter, fixed by correcting size to memmove.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-42292"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/57fe01d3d04276875c7e3a6dc763517fc05b8762",
          "url": "https://git.kernel.org/stable/c/57fe01d3d04276875c7e3a6dc763517fc05b8762"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/648d5490460d38436640da0812bf7f6351c150d2",
          "url": "https://git.kernel.org/stable/c/648d5490460d38436640da0812bf7f6351c150d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68d63ace80b76395e7935687ecdb86421adc2168",
          "url": "https://git.kernel.org/stable/c/68d63ace80b76395e7935687ecdb86421adc2168"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/81a15d28f32af01493ae8c5457e0d55314a4167d",
          "url": "https://git.kernel.org/stable/c/81a15d28f32af01493ae8c5457e0d55314a4167d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b59a5e86a3934f1b6a5bd1368902dbc79bdecc90",
          "url": "https://git.kernel.org/stable/c/b59a5e86a3934f1b6a5bd1368902dbc79bdecc90"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5ee8adc8d98a49703320d13878ba2b923b142f5",
          "url": "https://git.kernel.org/stable/c/c5ee8adc8d98a49703320d13878ba2b923b142f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d4663536754defff75ff1eca0aaebc41da165a8d",
          "url": "https://git.kernel.org/stable/c/d4663536754defff75ff1eca0aaebc41da165a8d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dd6e9894b451e7c85cceb8e9dc5432679a70e7dc",
          "url": "https://git.kernel.org/stable/c/dd6e9894b451e7c85cceb8e9dc5432679a70e7dc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-08-17T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-27395",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-27395"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2db9a8c0a01fa1c762c1e61a13c212c492752994",
          "url": "https://git.kernel.org/stable/c/2db9a8c0a01fa1c762c1e61a13c212c492752994"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/35880c3fa6f8fe281a19975d2992644588ca33d3",
          "url": "https://git.kernel.org/stable/c/35880c3fa6f8fe281a19975d2992644588ca33d3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/589523cf0b384164e445dd5db8d5b1bf97982424",
          "url": "https://git.kernel.org/stable/c/589523cf0b384164e445dd5db8d5b1bf97982424"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2",
          "url": "https://git.kernel.org/stable/c/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4",
          "url": "https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1",
          "url": "https://git.kernel.org/stable/c/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eaa5e164a2110d2fb9e16c8a29e4501882235137",
          "url": "https://git.kernel.org/stable/c/eaa5e164a2110d2fb9e16c8a29e4501882235137"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/edee0758747d7c219e29db9ed1d4eb33e8d32865",
          "url": "https://git.kernel.org/stable/c/edee0758747d7c219e29db9ed1d4eb33e8d32865"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-05-14T15:12:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38627",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(&stm->dev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38627"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20",
          "url": "https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459",
          "url": "https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247",
          "url": "https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931",
          "url": "https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b",
          "url": "https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36",
          "url": "https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695",
          "url": "https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be",
          "url": "https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-06-21T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50164",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue\n\nAfter successfull station association, if station queues are disabled for\nsome reason, the related lists are not emptied. So if some new element is\nadded to the list in iwl_mvm_mac_wake_tx_queue, it can match with the old\none and produce a BUG like this:\n\n[   46.535263] list_add corruption. prev->next should be next (ffff94c1c318a360), but was 0000000000000000. (prev=ffff94c1d02d3388).\n[   46.535283] ------------[ cut here ]------------\n[   46.535284] kernel BUG at lib/list_debug.c:26!\n[   46.535290] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[   46.585304] CPU: 0 PID: 623 Comm: wpa_supplicant Not tainted 5.19.0-rc3+ #1\n[   46.592380] Hardware name: Dell Inc. Inspiron 660s/0478VN       , BIOS A07 08/24/2012\n[   46.600336] RIP: 0010:__list_add_valid.cold+0x3d/0x3f\n[   46.605475] Code: f2 4c 89 c1 48 89 fe 48 c7 c7 c8 40 67 93 e8 20 cc fd ff 0f 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 70 40 67 93 e8 09 cc fd ff <0f> 0b 48 89 fe 48 c7 c7 00 41 67 93 e8 f8 cb fd ff 0f 0b 48 89 d1\n[   46.624469] RSP: 0018:ffffb20800ab76d8 EFLAGS: 00010286\n[   46.629854] RAX: 0000000000000075 RBX: ffff94c1c318a0e0 RCX: 0000000000000000\n[   46.637105] RDX: 0000000000000201 RSI: ffffffff9365e100 RDI: 00000000ffffffff\n[   46.644356] RBP: ffff94c1c5f43370 R08: 0000000000000075 R09: 3064316334396666\n[   46.651607] R10: 3364323064316334 R11: 39666666663d7665 R12: ffff94c1c5f43388\n[   46.658857] R13: ffff94c1d02d3388 R14: ffff94c1c318a360 R15: ffff94c1cf2289c0\n[   46.666108] FS:  00007f65634ff7c0(0000) GS:ffff94c1da200000(0000) knlGS:0000000000000000\n[   46.674331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   46.680170] CR2: 00007f7dfe984460 CR3: 000000010e894003 CR4: 00000000000606f0\n[   46.687422] Call Trace:\n[   46.689906]  <TASK>\n[   46.691950]  iwl_mvm_mac_wake_tx_queue+0xec/0x15c [iwlmvm]\n[   46.697601]  ieee80211_queue_skb+0x4b3/0x720 [mac80211]\n[   46.702973]  ? sta_info_get+0x46/0x60 [mac80211]\n[   46.707703]  ieee80211_tx+0xad/0x110 [mac80211]\n[   46.712355]  __ieee80211_tx_skb_tid_band+0x71/0x90 [mac80211]\n...\n\nIn order to avoid this problem, we must also remove the related lists when\nstation queues are disabled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50164"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/14a3aacf517a9de725dd3219dbbcf741e31763c4",
          "url": "https://git.kernel.org/stable/c/14a3aacf517a9de725dd3219dbbcf741e31763c4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/182d3c1385f44ba7c508bf5b1292a7fe96ad4e9e",
          "url": "https://git.kernel.org/stable/c/182d3c1385f44ba7c508bf5b1292a7fe96ad4e9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/38d71acc15a2e72806b516380af0adb3830d4639",
          "url": "https://git.kernel.org/stable/c/38d71acc15a2e72806b516380af0adb3830d4639"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a40af2b0b9517fca7ae2a030c9c0a16836303c0",
          "url": "https://git.kernel.org/stable/c/4a40af2b0b9517fca7ae2a030c9c0a16836303c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5cca5f714fe6cedd2df9d8451ad8df21e6464f62",
          "url": "https://git.kernel.org/stable/c/5cca5f714fe6cedd2df9d8451ad8df21e6464f62"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff068c25bf90d26f0aee1751553f18076b797e8d",
          "url": "https://git.kernel.org/stable/c/ff068c25bf90d26f0aee1751553f18076b797e8d"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53000",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n    u16 type = nla_type(nla);\n\n    if (type == 0 || type > maxtype) {\n        /* error or continue */\n    }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff",
          "url": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45",
          "url": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d",
          "url": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184",
          "url": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455",
          "url": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455"
        }
      ],
      "release_date": "2025-03-27T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-35886",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix infinite recursion in fib6_dump_done().\n\nsyzkaller reported infinite recursive calls of fib6_dump_done() during\nnetlink socket destruction.  [1]\n\nFrom the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then\nthe response was generated.  The following recvmmsg() resumed the dump\nfor IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due\nto the fault injection.  [0]\n\n  12:01:34 executing program 3:\n  r0 = socket$nl_route(0x10, 0x3, 0x0)\n  sendmsg$nl_route(r0, ... snip ...)\n  recvmmsg(r0, ... snip ...) (fail_nth: 8)\n\nHere, fib6_dump_done() was set to nlk_sk(sk)->cb.done, and the next call\nof inet6_dump_fib() set it to nlk_sk(sk)->cb.args[3].  syzkaller stopped\nreceiving the response halfway through, and finally netlink_sock_destruct()\ncalled nlk_sk(sk)->cb.done().\n\nfib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)->cb.done() if it\nis still not NULL.  fib6_dump_end() rewrites nlk_sk(sk)->cb.done() by\nnlk_sk(sk)->cb.args[3], but it has the same function, not NULL, calling\nitself recursively and hitting the stack guard page.\n\nTo avoid the issue, let's set the destructor after kzalloc().\n\n[0]:\nFAULT_INJECTION: forcing a failure.\nname failslab, interval 1, probability 0, space 0, times 0\nCPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl (lib/dump_stack.c:117)\n should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)\n should_failslab (mm/slub.c:3733)\n kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)\n inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)\n rtnl_dump_all (net/core/rtnetlink.c:4029)\n netlink_dump (net/netlink/af_netlink.c:2269)\n netlink_recvmsg (net/netlink/af_netlink.c:1988)\n ____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)\n ___sys_recvmsg (net/socket.c:2846)\n do_recvmmsg (net/socket.c:2943)\n __x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)\n\n[1]:\nBUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)\nstack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nWorkqueue: events netlink_sock_destruct_work\nRIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)\nCode: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd <53> 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff\nRSP: 0018:ffffc9000d980000 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3\nRDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358\nRBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000\nR13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68\nFS:  0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0\nPKRU: 55555554\nCall Trace:\n <#DF>\n </#DF>\n <TASK>\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n ...\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n netlink_sock_destruct (net/netlink/af_netlink.c:401)\n __sk_destruct (net/core/sock.c:2177 (discriminator 2))\n sk_destruct (net/core/sock.c:2224)\n __sk_free (net/core/sock.c:2235)\n sk_free (net/core/sock.c:2246)\n process_one_work (kernel/workqueue.c:3259)\n worker_thread (kernel/workqueue.c:3329 kernel/workqueue.\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-35886"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/167d4b47a9bdcb01541dfa29e9f3cbb8edd3dfd2",
          "url": "https://git.kernel.org/stable/c/167d4b47a9bdcb01541dfa29e9f3cbb8edd3dfd2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40a344b2ddc06c1a2caa7208a43911f39c662778",
          "url": "https://git.kernel.org/stable/c/40a344b2ddc06c1a2caa7208a43911f39c662778"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a7c465a5dcd657d59d25bf4815e19ac05c13061",
          "url": "https://git.kernel.org/stable/c/4a7c465a5dcd657d59d25bf4815e19ac05c13061"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9472d07cd095cbd3294ac54c42f304a38fbe9bfe",
          "url": "https://git.kernel.org/stable/c/9472d07cd095cbd3294ac54c42f304a38fbe9bfe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c5258196182c25b55c33167cd72fdd9bbf08985",
          "url": "https://git.kernel.org/stable/c/9c5258196182c25b55c33167cd72fdd9bbf08985"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d21d40605bca7bd5fc23ef03d4c1ca1f48bc2cae",
          "url": "https://git.kernel.org/stable/c/d21d40605bca7bd5fc23ef03d4c1ca1f48bc2cae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f2dd75e57285f49e34af1a5b6cd8945c08243776",
          "url": "https://git.kernel.org/stable/c/f2dd75e57285f49e34af1a5b6cd8945c08243776"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd307f2d91d40fa7bc55df3e2cd1253fabf8a2d6",
          "url": "https://git.kernel.org/stable/c/fd307f2d91d40fa7bc55df3e2cd1253fabf8a2d6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-05-19T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38586",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nr8169: Fix possible ring buffer corruption on fragmented Tx packets.\n\nAn issue was found on the RTL8125b when transmitting small fragmented\npackets, whereby invalid entries were inserted into the transmit ring\nbuffer, subsequently leading to calls to dma_unmap_single() with a null\naddress.\n\nThis was caused by rtl8169_start_xmit() not noticing changes to nr_frags\nwhich may occur when small packets are padded (to work around hardware\nquirks) in rtl8169_tso_csum_v2().\n\nTo fix this, postpone inspecting nr_frags until after any padding has been\napplied.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38586"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/078d5b7500d70af2de6b38e226b03f0b932026a6",
          "url": "https://git.kernel.org/stable/c/078d5b7500d70af2de6b38e226b03f0b932026a6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c48185a95309556725f818b82120bb74e9c627d",
          "url": "https://git.kernel.org/stable/c/0c48185a95309556725f818b82120bb74e9c627d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54e7a0d111240c92c0f02ceba6eb8f26bf6d6479",
          "url": "https://git.kernel.org/stable/c/54e7a0d111240c92c0f02ceba6eb8f26bf6d6479"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61c1c98e2607120ce9c3fa1bf75e6da909712b27",
          "url": "https://git.kernel.org/stable/c/61c1c98e2607120ce9c3fa1bf75e6da909712b27"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68222d7b4b72aa321135cd453dac37f00ec41fd1",
          "url": "https://git.kernel.org/stable/c/68222d7b4b72aa321135cd453dac37f00ec41fd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b6d21cf40de103d63ae78551098a7c06af8c98dd",
          "url": "https://git.kernel.org/stable/c/b6d21cf40de103d63ae78551098a7c06af8c98dd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c71e3a5cffd5309d7f84444df03d5b72600cc417",
          "url": "https://git.kernel.org/stable/c/c71e3a5cffd5309d7f84444df03d5b72600cc417"
        }
      ],
      "release_date": "2024-06-19T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37923",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix oob write in trace_seq_to_buffer()\n\nsyzbot reported this bug:\n==================================================================\nBUG: KASAN: slab-out-of-bounds in trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\nBUG: KASAN: slab-out-of-bounds in tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\nWrite of size 4507 at addr ffff888032b6b000 by task syz.2.320/7260\n\nCPU: 1 UID: 0 PID: 7260 Comm: syz.2.320 Not tainted 6.15.0-rc1-syzkaller-00301-g3bde70a2c827 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xc3/0x670 mm/kasan/report.c:521\n kasan_report+0xe0/0x110 mm/kasan/report.c:634\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189\n __asan_memcpy+0x3c/0x60 mm/kasan/shadow.c:106\n trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\n tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\n ....\n==================================================================\n\nIt has been reported that trace_seq_to_buffer() tries to copy more data\nthan PAGE_SIZE to buf. Therefore, to prevent this, we should use the\nsmaller of trace_seq_used(&iter->seq) and PAGE_SIZE as an argument.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37923"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897",
          "url": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f",
          "url": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d",
          "url": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157",
          "url": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9",
          "url": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4",
          "url": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606",
          "url": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb",
          "url": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-40978",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedi: Fix crash while reading debugfs attribute\n\nThe qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly\non a __user pointer, which results into the crash.\n\nTo fix this issue, use a small local stack buffer for sprintf() and then\ncall simple_read_from_buffer(), which in turns make the copy_to_user()\ncall.\n\nBUG: unable to handle page fault for address: 00007f4801111000\nPGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0\nOops: 0002 [#1] PREEMPT SMP PTI\nHardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023\nRIP: 0010:memcpy_orig+0xcd/0x130\nRSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202\nRAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f\nRDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000\nRBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572\nR10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff\nR13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af\nFS:  00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __die_body+0x1a/0x60\n ? page_fault_oops+0x183/0x510\n ? exc_page_fault+0x69/0x150\n ? asm_exc_page_fault+0x22/0x30\n ? memcpy_orig+0xcd/0x130\n vsnprintf+0x102/0x4c0\n sprintf+0x51/0x80\n qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]\n full_proxy_read+0x50/0x80\n vfs_read+0xa5/0x2e0\n ? folio_add_new_anon_rmap+0x44/0xa0\n ? set_pte_at+0x15/0x30\n ? do_pte_missing+0x426/0x7f0\n ksys_read+0xa5/0xe0\n do_syscall_64+0x58/0x80\n ? __count_memcg_events+0x46/0x90\n ? count_memcg_event_mm+0x3d/0x60\n ? handle_mm_fault+0x196/0x2f0\n ? do_user_addr_fault+0x267/0x890\n ? exc_page_fault+0x69/0x150\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f4800f20b4d",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-40978"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/144d76a676b630e321556965011b00e2de0b40a7",
          "url": "https://git.kernel.org/stable/c/144d76a676b630e321556965011b00e2de0b40a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/21c963de2e86e88f6a8ca556bcebb8e62ab8e901",
          "url": "https://git.kernel.org/stable/c/21c963de2e86e88f6a8ca556bcebb8e62ab8e901"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/28027ec8e32ecbadcd67623edb290dad61e735b5",
          "url": "https://git.kernel.org/stable/c/28027ec8e32ecbadcd67623edb290dad61e735b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/397a8990c377ee4b61d6df768e61dff9e316d46b",
          "url": "https://git.kernel.org/stable/c/397a8990c377ee4b61d6df768e61dff9e316d46b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56bec63a7fc87ad50b3373a87517dc9770eef9e0",
          "url": "https://git.kernel.org/stable/c/56bec63a7fc87ad50b3373a87517dc9770eef9e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e2f433ea7d0ff77998766a088a287337fb43ad75",
          "url": "https://git.kernel.org/stable/c/e2f433ea7d0ff77998766a088a287337fb43ad75"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eaddb86637669f6bad89245ee63f8fb2bfb50241",
          "url": "https://git.kernel.org/stable/c/eaddb86637669f6bad89245ee63f8fb2bfb50241"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fa85b016a56b9775a3fe41e5d26e666945963b46",
          "url": "https://git.kernel.org/stable/c/fa85b016a56b9775a3fe41e5d26e666945963b46"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-07-12T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-39487",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()\n\nIn function bond_option_arp_ip_targets_set(), if newval->string is an\nempty string, newval->string+1 will point to the byte after the\nstring, causing an out-of-bound read.\n\nBUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418\nRead of size 1 at addr ffff8881119c4781 by task syz-executor665/8107\nCPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0xc1/0x5e0 mm/kasan/report.c:475\n kasan_report+0xbe/0xf0 mm/kasan/report.c:588\n strlen+0x7d/0xa0 lib/string.c:418\n __fortify_strlen include/linux/fortify-string.h:210 [inline]\n in4_pton+0xa3/0x3f0 net/core/utils.c:130\n bond_option_arp_ip_targets_set+0xc2/0x910\ndrivers/net/bonding/bond_options.c:1201\n __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767\n __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792\n bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817\n bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156\n dev_attr_store+0x54/0x80 drivers/base/core.c:2366\n sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136\n kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334\n call_write_iter include/linux/fs.h:2020 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x96a/0xd80 fs/read_write.c:584\n ksys_write+0x122/0x250 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n---[ end trace ]---\n\nFix it by adding a check of string length before using it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-39487"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6a8a4fd082c439e19fede027e80c79bc4c84bb8e",
          "url": "https://git.kernel.org/stable/c/6a8a4fd082c439e19fede027e80c79bc4c84bb8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6b21346b399fd1336fe59233a17eb5ce73041ee1",
          "url": "https://git.kernel.org/stable/c/6b21346b399fd1336fe59233a17eb5ce73041ee1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/707c85ba3527ad6aa25552033576b0f1ff835d7b",
          "url": "https://git.kernel.org/stable/c/707c85ba3527ad6aa25552033576b0f1ff835d7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9f835e48bd4c75fdf6a9cff3f0b806a7abde78da",
          "url": "https://git.kernel.org/stable/c/9f835e48bd4c75fdf6a9cff3f0b806a7abde78da"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b75e33eae8667084bd4a63e67657c6a5a0f8d1e8",
          "url": "https://git.kernel.org/stable/c/b75e33eae8667084bd4a63e67657c6a5a0f8d1e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bfd14e5915c2669f292a31d028e75dcd82f1e7e9",
          "url": "https://git.kernel.org/stable/c/bfd14e5915c2669f292a31d028e75dcd82f1e7e9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8eb8ab9a44ff0e73492d0a12a643c449f641a9f",
          "url": "https://git.kernel.org/stable/c/c8eb8ab9a44ff0e73492d0a12a643c449f641a9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e271ff53807e8f2c628758290f0e499dbe51cb3d",
          "url": "https://git.kernel.org/stable/c/e271ff53807e8f2c628758290f0e499dbe51cb3d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-07-09T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26958",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix UAF in direct writes\n\nIn production we have been hitting the following warning consistently\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0\nWorkqueue: nfsiod nfs_direct_write_schedule_work [nfs]\nRIP: 0010:refcount_warn_saturate+0x9c/0xe0\nPKRU: 55555554\nCall Trace:\n <TASK>\n ? __warn+0x9f/0x130\n ? refcount_warn_saturate+0x9c/0xe0\n ? report_bug+0xcc/0x150\n ? handle_bug+0x3d/0x70\n ? exc_invalid_op+0x16/0x40\n ? asm_exc_invalid_op+0x16/0x20\n ? refcount_warn_saturate+0x9c/0xe0\n nfs_direct_write_schedule_work+0x237/0x250 [nfs]\n process_one_work+0x12f/0x4a0\n worker_thread+0x14e/0x3b0\n ? ZSTD_getCParams_internal+0x220/0x220\n kthread+0xdc/0x120\n ? __btf_name_valid+0xa0/0xa0\n ret_from_fork+0x1f/0x30\n\nThis is because we're completing the nfs_direct_request twice in a row.\n\nThe source of this is when we have our commit requests to submit, we\nprocess them and send them off, and then in the completion path for the\ncommit requests we have\n\nif (nfs_commit_end(cinfo.mds))\n\tnfs_direct_write_complete(dreq);\n\nHowever since we're submitting asynchronous requests we sometimes have\none that completes before we submit the next one, so we end up calling\ncomplete on the nfs_direct_request twice.\n\nThe only other place we use nfs_generic_commit_list() is in\n__nfs_commit_inode, which wraps this call in a\n\nnfs_commit_begin();\nnfs_commit_end();\n\nWhich is a common pattern for this style of completion handling, one\nthat is also repeated in the direct code with get_dreq()/put_dreq()\ncalls around where we process events as well as in the completion paths.\n\nFix this by using the same pattern for the commit requests.\n\nBefore with my 200 node rocksdb stress running this warning would pop\nevery 10ish minutes.  With my patch the stress test has been running for\nseveral hours without popping.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26958"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af",
          "url": "https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab",
          "url": "https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3",
          "url": "https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5",
          "url": "https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6cd3f13aaa62970b5169d990e936b2e96943bc6a",
          "url": "https://git.kernel.org/stable/c/6cd3f13aaa62970b5169d990e936b2e96943bc6a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f",
          "url": "https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95",
          "url": "https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605",
          "url": "https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        }
      ],
      "release_date": "2024-05-01T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47153",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Don't generate an interrupt on bus reset\n\nNow that the i2c-i801 driver supports interrupts, setting the KILL bit\nin a attempt to recover from a timed out transaction triggers an\ninterrupt. Unfortunately, the interrupt handler (i801_isr) is not\nprepared for this situation and will try to process the interrupt as\nif it was signaling the end of a successful transaction. In the case\nof a block transaction, this can result in an out-of-range memory\naccess.\n\nThis condition was reproduced several times by syzbot:\nhttps://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e\nhttps://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e\nhttps://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e\nhttps://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb\nhttps://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a\nhttps://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79\n\nSo disable interrupts while trying to reset the bus. Interrupts will\nbe enabled again for the following transaction.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b",
          "url": "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3",
          "url": "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a",
          "url": "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef",
          "url": "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c",
          "url": "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6",
          "url": "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
          "url": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629",
          "url": "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629"
        }
      ],
      "release_date": "2024-03-25T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37927",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid\n\nThere is a string parsing logic error which can lead to an overflow of hid\nor uid buffers. Comparing ACPIID_LEN against a total string length doesn't\ntake into account the lengths of individual hid and uid buffers so the\ncheck is insufficient in some cases. For example if the length of hid\nstring is 4 and the length of the uid string is 260, the length of str\nwill be equal to ACPIID_LEN + 1 but uid string will overflow uid buffer\nwhich size is 256.\n\nThe same applies to the hid string with length 13 and uid string with\nlength 250.\n\nCheck the length of hid and uid strings separately to prevent\nbuffer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37927"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718",
          "url": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29",
          "url": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1",
          "url": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5",
          "url": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c",
          "url": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e",
          "url": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f",
          "url": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f",
          "url": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix use-after-free\n\nFix potential use-after-free in l2cap_le_command_rej.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
          "url": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
          "url": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8",
          "url": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
          "url": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
          "url": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b",
          "url": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f",
          "url": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df",
          "url": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52885",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix UAF in svc_tcp_listen_data_ready()\n\nAfter the listener svc_sock is freed, and before invoking svc_tcp_accept()\nfor the established child sock, there is a window that the newsock\nretaining a freed listener svc_sock in sk_user_data which cloning from\nparent. In the race window, if data is received on the newsock, we will\nobserve use-after-free report in svc_tcp_listen_data_ready().\n\nReproduce by two tasks:\n\n1. while :; do rpc.nfsd 0 ; rpc.nfsd; done\n2. while :; do echo \"\" | ncat -4 127.0.0.1 2049 ; done\n\nKASAN report:\n\n  ==================================================================\n  BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n  Read of size 8 at addr ffff888139d96228 by task nc/102553\n  CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18\n  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n  Call Trace:\n   <IRQ>\n   dump_stack_lvl+0x33/0x50\n   print_address_description.constprop.0+0x27/0x310\n   print_report+0x3e/0x70\n   kasan_report+0xae/0xe0\n   svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]\n   tcp_data_queue+0x9f4/0x20e0\n   tcp_rcv_established+0x666/0x1f60\n   tcp_v4_do_rcv+0x51c/0x850\n   tcp_v4_rcv+0x23fc/0x2e80\n   ip_protocol_deliver_rcu+0x62/0x300\n   ip_local_deliver_finish+0x267/0x350\n   ip_local_deliver+0x18b/0x2d0\n   ip_rcv+0x2fb/0x370\n   __netif_receive_skb_one_core+0x166/0x1b0\n   process_backlog+0x24c/0x5e0\n   __napi_poll+0xa2/0x500\n   net_rx_action+0x854/0xc90\n   __do_softirq+0x1bb/0x5de\n   do_softirq+0xcb/0x100\n   </IRQ>\n   <TASK>\n   ...\n   </TASK>\n\n  Allocated by task 102371:\n   kasan_save_stack+0x1e/0x40\n   kasan_set_track+0x21/0x30\n   __kasan_kmalloc+0x7b/0x90\n   svc_setup_socket+0x52/0x4f0 [sunrpc]\n   svc_addsock+0x20d/0x400 [sunrpc]\n   __write_ports_addfd+0x209/0x390 [nfsd]\n   write_ports+0x239/0x2c0 [nfsd]\n   nfsctl_transaction_write+0xac/0x110 [nfsd]\n   vfs_write+0x1c3/0xae0\n   ksys_write+0xed/0x1c0\n   do_syscall_64+0x38/0x90\n   entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\n  Freed by task 102551:\n   kasan_save_stack+0x1e/0x40\n   kasan_set_track+0x21/0x30\n   kasan_save_free_info+0x2a/0x50\n   __kasan_slab_free+0x106/0x190\n   __kmem_cache_free+0x133/0x270\n   svc_xprt_free+0x1e2/0x350 [sunrpc]\n   svc_xprt_destroy_all+0x25a/0x440 [sunrpc]\n   nfsd_put+0x125/0x240 [nfsd]\n   nfsd_svc+0x2cb/0x3c0 [nfsd]\n   write_threads+0x1ac/0x2a0 [nfsd]\n   nfsctl_transaction_write+0xac/0x110 [nfsd]\n   vfs_write+0x1c3/0xae0\n   ksys_write+0xed/0x1c0\n   do_syscall_64+0x38/0x90\n   entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nFix the UAF by simply doing nothing in svc_tcp_listen_data_ready()\nif state != TCP_LISTEN, that will avoid dereferencing svsk for all\nchild socket.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52885"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/42725e5c1b181b757ba11d804443922982334d9b",
          "url": "https://git.kernel.org/stable/c/42725e5c1b181b757ba11d804443922982334d9b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e1f989055622fd086c5dfb291fc72adf5660b6f",
          "url": "https://git.kernel.org/stable/c/7e1f989055622fd086c5dfb291fc72adf5660b6f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c7b8c2d06e437639694abe76978e915cfb73f428",
          "url": "https://git.kernel.org/stable/c/c7b8c2d06e437639694abe76978e915cfb73f428"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd5ec3ee52ce4b7e283cc11facfa420c297c8065",
          "url": "https://git.kernel.org/stable/c/cd5ec3ee52ce4b7e283cc11facfa420c297c8065"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dfc896c4a75cb8cd7cb2dfd9b469cf1e3f004254",
          "url": "https://git.kernel.org/stable/c/dfc896c4a75cb8cd7cb2dfd9b469cf1e3f004254"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef047411887ff0845afd642d6a687819308e1a4e",
          "url": "https://git.kernel.org/stable/c/ef047411887ff0845afd642d6a687819308e1a4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fbf4ace39b2e4f3833236afbb2336edbafd75eee",
          "url": "https://git.kernel.org/stable/c/fbf4ace39b2e4f3833236afbb2336edbafd75eee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc80fc2d4e39137869da3150ee169b40bf879287",
          "url": "https://git.kernel.org/stable/c/fc80fc2d4e39137869da3150ee169b40bf879287"
        }
      ],
      "release_date": "2024-07-14T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50279",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit()\n\nThere is a global-out-of-bounds reported by KASAN:\n\n  BUG: KASAN: global-out-of-bounds in\n  _rtl8812ae_eq_n_byte.part.0+0x3d/0x84 [rtl8821ae]\n  Read of size 1 at addr ffffffffa0773c43 by task NetworkManager/411\n\n  CPU: 6 PID: 411 Comm: NetworkManager Tainted: G      D\n  6.1.0-rc8+ #144 e15588508517267d37\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009),\n  Call Trace:\n   <TASK>\n   ...\n   kasan_report+0xbb/0x1c0\n   _rtl8812ae_eq_n_byte.part.0+0x3d/0x84 [rtl8821ae]\n   rtl8821ae_phy_bb_config.cold+0x346/0x641 [rtl8821ae]\n   rtl8821ae_hw_init+0x1f5e/0x79b0 [rtl8821ae]\n   ...\n   </TASK>\n\nThe root cause of the problem is that the comparison order of\n\"prate_section\" in _rtl8812ae_phy_set_txpower_limit() is wrong. The\n_rtl8812ae_eq_n_byte() is used to compare the first n bytes of the two\nstrings from tail to head, which causes the problem. In the\n_rtl8812ae_phy_set_txpower_limit(), it was originally intended to meet\nthis requirement by carefully designing the comparison order.\nFor example, \"pregulation\" and \"pbandwidth\" are compared in order of\nlength from small to large, first is 3 and last is 4. However, the\ncomparison order of \"prate_section\" dose not obey such order requirement,\ntherefore when \"prate_section\" is \"HT\", when comparing from tail to head,\nit will lead to access out of bounds in _rtl8812ae_eq_n_byte(). As\nmentioned above, the _rtl8812ae_eq_n_byte() has the same function as\nstrcmp(), so just strcmp() is enough.\n\nFix it by removing _rtl8812ae_eq_n_byte() and use strcmp() barely.\nAlthough it can be fixed by adjusting the comparison order of\n\"prate_section\", this may cause the value of \"rate_section\" to not be\nfrom 0 to 5. In addition, commit \"21e4b0726dc6\" not only moved driver\nfrom staging to regular tree, but also added setting txpower limit\nfunction during the driver config phase, so the problem was introduced\nby this commit.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50279"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/057b52461dc005ecd85a3e4998913b1492ec0f72",
          "url": "https://git.kernel.org/stable/c/057b52461dc005ecd85a3e4998913b1492ec0f72"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c962dcd6bf64b78eaffc09e497a2beb4e48bc32",
          "url": "https://git.kernel.org/stable/c/0c962dcd6bf64b78eaffc09e497a2beb4e48bc32"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/117dbeda22ec5ea0918254d03b540ef8b8a64d53",
          "url": "https://git.kernel.org/stable/c/117dbeda22ec5ea0918254d03b540ef8b8a64d53"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e950b9a841bc96e98ee25680d5c7aa305120be1",
          "url": "https://git.kernel.org/stable/c/1e950b9a841bc96e98ee25680d5c7aa305120be1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/28ea268d95e57cdf6394a058f0d854206d478772",
          "url": "https://git.kernel.org/stable/c/28ea268d95e57cdf6394a058f0d854206d478772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1fe40120de6ad4ffa8299fde035a5feba10d4fb",
          "url": "https://git.kernel.org/stable/c/f1fe40120de6ad4ffa8299fde035a5feba10d4fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc3442247716fc426bbcf62ed65e086e48a6d44f",
          "url": "https://git.kernel.org/stable/c/fc3442247716fc426bbcf62ed65e086e48a6d44f"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52594",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()\n\nFix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug\noccurs when txs->cnt, data from a URB provided by a USB device, is\nbigger than the size of the array txs->txstatus, which is\nHTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug\nhandling code after the check. Make the function return if that is the\ncase.\n\nFound by a modified version of syzkaller.\n\nUBSAN: array-index-out-of-bounds in htc_drv_txrx.c\nindex 13 is out of range for type '__wmi_event_txstatus [12]'\nCall Trace:\n ath9k_htc_txstatus\n ath9k_wmi_event_tasklet\n tasklet_action_common\n __do_softirq\n irq_exit_rxu\n sysvec_apic_timer_interrupt",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52594"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234",
          "url": "https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348",
          "url": "https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1",
          "url": "https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9",
          "url": "https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1",
          "url": "https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d",
          "url": "https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225",
          "url": "https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc",
          "url": "https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-03-06T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39971",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ni40e: fix idx validation in config queues msg\nEnsure idx is within range of active/initialized TCs when iterating over\nvf->ch[idx] in i40e_vc_config_queues_msg().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39971"
        }
      ],
      "release_date": "2025-10-15T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-35855",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update\n\nThe rule activity update delayed work periodically traverses the list of\nconfigured rules and queries their activity from the device.\n\nAs part of this task it accesses the entry pointed by 'ventry->entry',\nbut this entry can be changed concurrently by the rehash delayed work,\nleading to a use-after-free [1].\n\nFix by closing the race and perform the activity query under the\n'vregion->lock' mutex.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\nRead of size 8 at addr ffff8881054ed808 by task kworker/0:18/181\n\nCPU: 0 PID: 181 Comm: kworker/0:18 Not tainted 6.9.0-rc2-custom-00781-gd5ab772d32f7 #2\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_rule_activity_update_work\nCall Trace:\n <TASK>\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\n mlxsw_sp_acl_rule_activity_update_work+0x219/0x400\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nAllocated by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_entry_create+0x7b/0x1f0\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x30d/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3d7/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-35855"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b73f6e4ea770410a937a8db98f77e52594d23a0",
          "url": "https://git.kernel.org/stable/c/1b73f6e4ea770410a937a8db98f77e52594d23a0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4",
          "url": "https://git.kernel.org/stable/c/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b183b915beef818a25e3154d719ca015a1ae0770",
          "url": "https://git.kernel.org/stable/c/b183b915beef818a25e3154d719ca015a1ae0770"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a",
          "url": "https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c17976b42d546ee118ca300db559630ee96fb758",
          "url": "https://git.kernel.org/stable/c/c17976b42d546ee118ca300db559630ee96fb758"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e24d2487424779c02760ff50cd9021b8676e19ef",
          "url": "https://git.kernel.org/stable/c/e24d2487424779c02760ff50cd9021b8676e19ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/feabdac2057e863d0e140a2adf3d232eb4882db4",
          "url": "https://git.kernel.org/stable/c/feabdac2057e863d0e140a2adf3d232eb4882db4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        }
      ],
      "release_date": "2024-05-17T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37839",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: remove wrong sb->s_sequence check\n\nJournal emptiness is not determined by sb->s_sequence == 0 but rather by\nsb->s_start == 0 (which is set a few lines above). Furthermore 0 is a\nvalid transaction ID so the check can spuriously trigger. Remove the\ninvalid WARN_ON.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77",
          "url": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457",
          "url": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac",
          "url": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf",
          "url": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1",
          "url": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b",
          "url": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0",
          "url": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6",
          "url": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148",
          "url": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48883",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent\n\nA user is able to configure an arbitrary number of rx queues when\ncreating an interface via netlink. This doesn't work for child PKEY\ninterfaces because the child interface uses the parent receive channels.\n\nAlthough the child shares the parent's receive channels, the number of\nrx queues is important for the channel_stats array: the parent's rx\nchannel index is used to access the child's channel_stats. So the array\nhas to be at least as large as the parent's rx queue size for the\ncounting to work correctly and to prevent out of bound accesses.\n\nThis patch checks for the mentioned scenario and returns an error when\ntrying to create the interface. The error is propagated to the user.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48883"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/31c70bfe58ef09fe36327ddcced9143a16e9e83d",
          "url": "https://git.kernel.org/stable/c/31c70bfe58ef09fe36327ddcced9143a16e9e83d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5844a46f09f768da866d6b0ffbf1a9073266bf24",
          "url": "https://git.kernel.org/stable/c/5844a46f09f768da866d6b0ffbf1a9073266bf24"
        }
      ],
      "release_date": "2024-08-21T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26982",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check the inode number is not the invalid value of zero\n\nSyskiller has produced an out of bounds access in fill_meta_index().\n\nThat out of bounds access is ultimately caused because the inode\nhas an inode number with the invalid value of zero, which was not checked.\n\nThe reason this causes the out of bounds access is due to following\nsequence of events:\n\n1. Fill_meta_index() is called to allocate (via empty_meta_index())\n   and fill a metadata index.  It however suffers a data read error\n   and aborts, invalidating the newly returned empty metadata index.\n   It does this by setting the inode number of the index to zero,\n   which means unused (zero is not a valid inode number).\n\n2. When fill_meta_index() is subsequently called again on another\n   read operation, locate_meta_index() returns the previous index\n   because it matches the inode number of 0.  Because this index\n   has been returned it is expected to have been filled, and because\n   it hasn't been, an out of bounds access is performed.\n\nThis patch adds a sanity check which checks that the inode number\nis not zero when the inode is created and returns -EINVAL if it is.\n\n[phillip@squashfs.org.uk: whitespace fix]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26982"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7",
          "url": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94",
          "url": "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013",
          "url": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
          "url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
          "url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
          "url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f",
          "url": "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"
        }
      ],
      "release_date": "2024-05-01T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-21546",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix WRITE_SAME No Data Buffer crash\n\nIn newer version of the SBC specs, we have a NDOB bit that indicates there\nis no data buffer that gets written out. If this bit is set using commands\nlike \"sg_write_same --ndob\" we will crash in target_core_iblock/file's\nexecute_write_same handlers when we go to access the se_cmd->t_data_sg\nbecause its NULL.\n\nThis patch adds a check for the NDOB bit in the common WRITE SAME code\nbecause we don't support it. And, it adds a check for zero SG elements in\neach handler in case the initiator tries to send a normal WRITE SAME with\nno data buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-21546"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510",
          "url": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b",
          "url": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29",
          "url": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899",
          "url": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-02T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52835",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Bail out early if the request AUX area is out of bound\n\nWhen perf-record with a large AUX area, e.g 4GB, it fails with:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)\n\nand it reveals a WARNING with __alloc_pages():\n\n\t------------[ cut here ]------------\n\tWARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248\n\tCall trace:\n\t __alloc_pages+0x1ec/0x248\n\t __kmalloc_large_node+0xc0/0x1f8\n\t __kmalloc_node+0x134/0x1e8\n\t rb_alloc_aux+0xe0/0x298\n\t perf_mmap+0x440/0x660\n\t mmap_region+0x308/0x8a8\n\t do_mmap+0x3c0/0x528\n\t vm_mmap_pgoff+0xf4/0x1b8\n\t ksys_mmap_pgoff+0x18c/0x218\n\t __arm64_sys_mmap+0x38/0x58\n\t invoke_syscall+0x50/0x128\n\t el0_svc_common.constprop.0+0x58/0x188\n\t do_el0_svc+0x34/0x50\n\t el0_svc+0x34/0x108\n\t el0t_64_sync_handler+0xb8/0xc0\n\t el0t_64_sync+0x1a4/0x1a8\n\n'rb->aux_pages' allocated by kcalloc() is a pointer array which is used to\nmaintains AUX trace pages. The allocated page for this array is physically\ncontiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the\nsize of pointer array crosses the limitation set by MAX_ORDER, it reveals a\nWARNING.\n\nSo bail out early with -ENOMEM if the request AUX area is out of bound,\ne.g.:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52835"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece",
          "url": "https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a",
          "url": "https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb",
          "url": "https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916",
          "url": "https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734",
          "url": "https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f",
          "url": "https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a",
          "url": "https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a",
          "url": "https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38051",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x53/0x70\n  print_report+0xce/0x640\n  kasan_report+0xb8/0xf0\n  cifs_fill_dirent+0xb03/0xb60 [cifs]\n  cifs_readdir+0x12cb/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\n f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n  </TASK>\n\n Allocated by task 408:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  __kasan_slab_alloc+0x6e/0x70\n  kmem_cache_alloc_noprof+0x117/0x3d0\n  mempool_alloc_noprof+0xf2/0x2c0\n  cifs_buf_get+0x36/0x80 [cifs]\n  allocate_buffers+0x1d2/0x330 [cifs]\n  cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n  kthread+0x394/0x720\n  ret_from_fork+0x34/0x70\n  ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3b/0x60\n  __kasan_slab_free+0x37/0x50\n  kmem_cache_free+0x2b8/0x500\n  cifs_buf_release+0x3c/0x70 [cifs]\n  cifs_readdir+0x1c97/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents64+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n  which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n  freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                             ^\n  ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1                       Process 2\n-----------------------------------\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38051"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
          "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
          "url": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
          "url": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
          "url": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
          "url": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
          "url": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
          "url": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
          "url": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50403",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was identified in the Linux kernel's ext4 filesystem implementation due to a flaw in how it processes filesystem metadata. An attacker with local privileges could create a malicious ext4 filesystem image to trigger this issue. When the system attempts to mount this malicious image, the kernel performs an incorrect calculation. This action results in unpredictable system behavior.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50403"
        }
      ],
      "release_date": "2025-09-18T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50252",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Do not free q_vector unless new one was allocated\n\nAvoid potential use-after-free condition under memory pressure. If the\nkzalloc() fails, q_vector will be freed but left in the original\nadapter->q_vector[v_idx] array position.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50252"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633",
          "url": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801",
          "url": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8",
          "url": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff",
          "url": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c",
          "url": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803",
          "url": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3",
          "url": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a",
          "url": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075",
          "url": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37780",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisofs: Prevent the use of too small fid\n\nsyzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1]\n\nThe handle_bytes value passed in by the reproducing program is equal to 12.\nIn handle_to_path(), only 12 bytes of memory are allocated for the structure\nfile_handle->f_handle member, which causes an out-of-bounds access when\naccessing the member parent_block of the structure isofs_fid in isofs,\nbecause accessing parent_block requires at least 16 bytes of f_handle.\nHere, fh_len is used to indirectly confirm that the value of handle_bytes\nis greater than 3 before accessing parent_block.\n\n[1]\nBUG: KASAN: slab-out-of-bounds in isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\nRead of size 4 at addr ffff0000cc030d94 by task syz-executor215/6466\nCPU: 1 UID: 0 PID: 6466 Comm: syz-executor215 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall trace:\n show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0x198/0x550 mm/kasan/report.c:521\n kasan_report+0xd8/0x138 mm/kasan/report.c:634\n __asan_report_load4_noabort+0x20/0x2c mm/kasan/report_generic.c:380\n isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183\n exportfs_decode_fh_raw+0x2dc/0x608 fs/exportfs/expfs.c:523\n do_handle_to_path+0xa0/0x198 fs/fhandle.c:257\n handle_to_path fs/fhandle.c:385 [inline]\n do_handle_open+0x8cc/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n\nAllocated by task 6466:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x40/0x78 mm/kasan/common.c:68\n kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:562\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4294 [inline]\n __kmalloc_noprof+0x32c/0x54c mm/slub.c:4306\n kmalloc_noprof include/linux/slab.h:905 [inline]\n handle_to_path fs/fhandle.c:357 [inline]\n do_handle_open+0x5a4/0xb8c fs/fhandle.c:403\n __do_sys_open_by_handle_at fs/fhandle.c:443 [inline]\n __se_sys_open_by_handle_at fs/fhandle.c:434 [inline]\n __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37780"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/007124c896e7d4614ac1f6bd4dedb975c35a2a8e",
          "url": "https://git.kernel.org/stable/c/007124c896e7d4614ac1f6bd4dedb975c35a2a8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0405d4b63d082861f4eaff9d39c78ee9dc34f845",
          "url": "https://git.kernel.org/stable/c/0405d4b63d082861f4eaff9d39c78ee9dc34f845"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0fdafdaef796816a9ed0fd7ac812932d569d9beb",
          "url": "https://git.kernel.org/stable/c/0fdafdaef796816a9ed0fd7ac812932d569d9beb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56dfffea9fd3be0b3795a9ca6401e133a8427e0b",
          "url": "https://git.kernel.org/stable/c/56dfffea9fd3be0b3795a9ca6401e133a8427e0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e7de55602c61c8ff28db075cc49c8dd6989d7e0",
          "url": "https://git.kernel.org/stable/c/5e7de55602c61c8ff28db075cc49c8dd6989d7e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63d5a3e207bf315a32c7d16de6c89753a759f95a",
          "url": "https://git.kernel.org/stable/c/63d5a3e207bf315a32c7d16de6c89753a759f95a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/952e7a7e317f126d0a2b879fc531b716932d5ffa",
          "url": "https://git.kernel.org/stable/c/952e7a7e317f126d0a2b879fc531b716932d5ffa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee01a309ebf598be1ff8174901ed6e91619f1749",
          "url": "https://git.kernel.org/stable/c/ee01a309ebf598be1ff8174901ed6e91619f1749"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49907",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: fix undefined behavior in bit shift for __mdiobus_register\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in drivers/net/phy/mdio_bus.c:586:27\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n __mdiobus_register+0x49d/0x4e0\n fixed_mdio_bus_init+0xd8/0x12d\n do_one_initcall+0x76/0x430\n kernel_init_freeable+0x3b3/0x422\n kernel_init+0x24/0x1e0\n ret_from_fork+0x1f/0x30\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49907"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7",
          "url": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a",
          "url": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2",
          "url": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d",
          "url": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0",
          "url": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e",
          "url": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d",
          "url": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973",
          "url": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50030",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input\n\nMalformed user input to debugfs results in buffer overflow crashes.  Adapt\ninput string lengths to fit within internal buffers, leaving space for NULL\nterminators.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50030"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060",
          "url": "https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d",
          "url": "https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a",
          "url": "https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828",
          "url": "https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb",
          "url": "https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38212",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough.  If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38212"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9",
          "url": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c",
          "url": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884",
          "url": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68",
          "url": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d",
          "url": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057",
          "url": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7",
          "url": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472",
          "url": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26961",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac802154: fix llsec key resources release in mac802154_llsec_key_del\n\nmac802154_llsec_key_del() can free resources of a key directly without\nfollowing the RCU rules for waiting before the end of a grace period. This\nmay lead to use-after-free in case llsec_lookup_key() is traversing the\nlist of keys in parallel with a key deletion:\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 4 PID: 16000 at lib/refcount.c:25 refcount_warn_saturate+0x162/0x2a0\nModules linked in:\nCPU: 4 PID: 16000 Comm: wpan-ping Not tainted 6.7.0 #19\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nRIP: 0010:refcount_warn_saturate+0x162/0x2a0\nCall Trace:\n <TASK>\n llsec_lookup_key.isra.0+0x890/0x9e0\n mac802154_llsec_encrypt+0x30c/0x9c0\n ieee802154_subif_start_xmit+0x24/0x1e0\n dev_hard_start_xmit+0x13e/0x690\n sch_direct_xmit+0x2ae/0xbc0\n __dev_queue_xmit+0x11dd/0x3c20\n dgram_sendmsg+0x90b/0xd60\n __sys_sendto+0x466/0x4c0\n __x64_sys_sendto+0xe0/0x1c0\n do_syscall_64+0x45/0xf0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nAlso, ieee802154_llsec_key_entry structures are not freed by\nmac802154_llsec_key_del():\n\nunreferenced object 0xffff8880613b6980 (size 64):\n  comm \"iwpan\", pid 2176, jiffies 4294761134 (age 60.475s)\n  hex dump (first 32 bytes):\n    78 0d 8f 18 80 88 ff ff 22 01 00 00 00 00 ad de  x.......\".......\n    00 00 00 00 00 00 00 00 03 00 cd ab 00 00 00 00  ................\n  backtrace:\n    [<ffffffff81dcfa62>] __kmem_cache_alloc_node+0x1e2/0x2d0\n    [<ffffffff81c43865>] kmalloc_trace+0x25/0xc0\n    [<ffffffff88968b09>] mac802154_llsec_key_add+0xac9/0xcf0\n    [<ffffffff8896e41a>] ieee802154_add_llsec_key+0x5a/0x80\n    [<ffffffff8892adc6>] nl802154_add_llsec_key+0x426/0x5b0\n    [<ffffffff86ff293e>] genl_family_rcv_msg_doit+0x1fe/0x2f0\n    [<ffffffff86ff46d1>] genl_rcv_msg+0x531/0x7d0\n    [<ffffffff86fee7a9>] netlink_rcv_skb+0x169/0x440\n    [<ffffffff86ff1d88>] genl_rcv+0x28/0x40\n    [<ffffffff86fec15c>] netlink_unicast+0x53c/0x820\n    [<ffffffff86fecd8b>] netlink_sendmsg+0x93b/0xe60\n    [<ffffffff86b91b35>] ____sys_sendmsg+0xac5/0xca0\n    [<ffffffff86b9c3dd>] ___sys_sendmsg+0x11d/0x1c0\n    [<ffffffff86b9c65a>] __sys_sendmsg+0xfa/0x1d0\n    [<ffffffff88eadbf5>] do_syscall_64+0x45/0xf0\n    [<ffffffff890000ea>] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n\nHandle the proper resource release in the RCU callback function\nmac802154_llsec_key_del_rcu().\n\nNote that if llsec_lookup_key() finds a key, it gets a refcount via\nllsec_key_get() and locally copies key id from key_entry (which is a\nlist element). So it's safe to call llsec_key_put() and free the list\nentry after the RCU grace period elapses.\n\nFound by Linux Verification Center (linuxtesting.org).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26961"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/068ab2759bc0b4daf0b964de61b2731449c86531",
          "url": "https://git.kernel.org/stable/c/068ab2759bc0b4daf0b964de61b2731449c86531"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20d3e1c8a1847497269f04d874b2a5818ec29e2d",
          "url": "https://git.kernel.org/stable/c/20d3e1c8a1847497269f04d874b2a5818ec29e2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49c8951680d7b76fceaee89dcfbab1363fb24fd1",
          "url": "https://git.kernel.org/stable/c/49c8951680d7b76fceaee89dcfbab1363fb24fd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/640297c3e897bd7e1481466a6a5cb9560f1edb88",
          "url": "https://git.kernel.org/stable/c/640297c3e897bd7e1481466a6a5cb9560f1edb88"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3d858650933d44ac12c1f31337e7110c2071821",
          "url": "https://git.kernel.org/stable/c/d3d858650933d44ac12c1f31337e7110c2071821"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f",
          "url": "https://git.kernel.org/stable/c/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e8a1e58345cf40b7b272e08ac7b32328b2543e40",
          "url": "https://git.kernel.org/stable/c/e8a1e58345cf40b7b272e08ac7b32328b2543e40"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        }
      ],
      "release_date": "2024-05-01T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49581",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: Fix buffer overflow in be_get_module_eeprom\n\nbe_cmd_read_port_transceiver_data assumes that it is given a buffer that\nis at least PAGE_DATA_LEN long, or twice that if the module supports SFF\n8472. However, this is not always the case.\n\nFix this by passing the desired offset and length to\nbe_cmd_read_port_transceiver_data so that we only copy the bytes once.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49581"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18043da94c023f3ef09c15017bdb04e8f695ef10",
          "url": "https://git.kernel.org/stable/c/18043da94c023f3ef09c15017bdb04e8f695ef10"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/665cbe91de2f7c97c51ca8fce39aae26477c1948",
          "url": "https://git.kernel.org/stable/c/665cbe91de2f7c97c51ca8fce39aae26477c1948"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ff4f9df73e5c551a72ee6034886c17e8de6596d",
          "url": "https://git.kernel.org/stable/c/8ff4f9df73e5c551a72ee6034886c17e8de6596d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a5a8fc0679a8fd58d47aa2ebcfc5742631f753f9",
          "url": "https://git.kernel.org/stable/c/a5a8fc0679a8fd58d47aa2ebcfc5742631f753f9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8569f76df7ec5b4b51155c57523a0b356db5741",
          "url": "https://git.kernel.org/stable/c/a8569f76df7ec5b4b51155c57523a0b356db5741"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aba8ff847f4f927ad7a1a1ee4a9f29989a1a728f",
          "url": "https://git.kernel.org/stable/c/aba8ff847f4f927ad7a1a1ee4a9f29989a1a728f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d7241f679a59cfe27f92cb5c6272cb429fb1f7ec",
          "url": "https://git.kernel.org/stable/c/d7241f679a59cfe27f92cb5c6272cb429fb1f7ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe4473fc7940f14c4a12db873b9729134c212654",
          "url": "https://git.kernel.org/stable/c/fe4473fc7940f14c4a12db873b9729134c212654"
        }
      ],
      "release_date": "2025-02-26T07:01:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38555",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Discard command completions in internal error\n\nFix use after free when FW completion arrives while device is in\ninternal error state. Avoid calling completion handler in this case,\nsince the device will flush the command interface and trigger all\ncompletions manually.\n\nKernel log:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\n...\nRIP: 0010:refcount_warn_saturate+0xd8/0xe0\n...\nCall Trace:\n<IRQ>\n? __warn+0x79/0x120\n? refcount_warn_saturate+0xd8/0xe0\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? refcount_warn_saturate+0xd8/0xe0\ncmd_ent_put+0x13b/0x160 [mlx5_core]\nmlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]\ncmd_comp_notifier+0x1f/0x30 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nmlx5_eq_async_int+0xf6/0x290 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nirq_int_handler+0x19/0x30 [mlx5_core]\n__handle_irq_event_percpu+0x4b/0x160\nhandle_irq_event+0x2e/0x80\nhandle_edge_irq+0x98/0x230\n__common_interrupt+0x3b/0xa0\ncommon_interrupt+0x7b/0xa0\n</IRQ>\n<TASK>\nasm_common_interrupt+0x22/0x40",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb",
          "url": "https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7",
          "url": "https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0",
          "url": "https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a",
          "url": "https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396",
          "url": "https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40",
          "url": "https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3",
          "url": "https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3"
        }
      ],
      "release_date": "2024-06-19T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38415",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check return result of sb_min_blocksize\n\nSyzkaller reports an \"UBSAN: shift-out-of-bounds in squashfs_bio_read\" bug.\n\nSyzkaller forks multiple processes which after mounting the Squashfs\nfilesystem, issues an ioctl(\"/dev/loop0\", LOOP_SET_BLOCK_SIZE, 0x8000). \nNow if this ioctl occurs at the same time another process is in the\nprocess of mounting a Squashfs filesystem on /dev/loop0, the failure\noccurs.  When this happens the following code in squashfs_fill_super()\nfails.\n\n----\nmsblk->devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);\nmsblk->devblksize_log2 = ffz(~msblk->devblksize);\n----\n\nsb_min_blocksize() returns 0, which means msblk->devblksize is set to 0.\n\nAs a result, ffz(~msblk->devblksize) returns 64, and msblk->devblksize_log2\nis set to 64.\n\nThis subsequently causes the\n\nUBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36\nshift exponent 64 is too large for 64-bit type 'u64' (aka\n'unsigned long long')\n\nThis commit adds a check for a 0 return by sb_min_blocksize().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38415"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425",
          "url": "https://git.kernel.org/stable/c/0aff95d9bc7fb5400ca8af507429c4b067bdb425"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282",
          "url": "https://git.kernel.org/stable/c/295ab18c2dbce8d0ac6ecf7c5187e16e1ac8b282"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b",
          "url": "https://git.kernel.org/stable/c/4f99357dadbf9c979ad737156ad4c37fadf7c56b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5",
          "url": "https://git.kernel.org/stable/c/549f9e3d7b60d53808c98b9fde49b4f46d0524a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68",
          "url": "https://git.kernel.org/stable/c/5c51aa862cbeed2f3887f0382a2708956710bd68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25",
          "url": "https://git.kernel.org/stable/c/6abf6b78c6fb112eee495f5636ffcc350dd2ce25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84",
          "url": "https://git.kernel.org/stable/c/734aa85390ea693bb7eaf2240623d41b03705c84"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497",
          "url": "https://git.kernel.org/stable/c/db7096ea160e40d78c67fce52e7cc51bde049497"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38346",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix UAF when lookup kallsym after ftrace disabled\n\nThe following issue happens with a buggy module:\n\nBUG: unable to handle page fault for address: ffffffffc05d0218\nPGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0\nOops: Oops: 0000 [#1] SMP KASAN PTI\nTainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nRIP: 0010:sized_strscpy+0x81/0x2f0\nRSP: 0018:ffff88812d76fa08 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000\nRDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d\nRBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68\nR10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038\nR13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff\nFS:  00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ftrace_mod_get_kallsym+0x1ac/0x590\n update_iter_mod+0x239/0x5b0\n s_next+0x5b/0xa0\n seq_read_iter+0x8c9/0x1070\n seq_read+0x249/0x3b0\n proc_reg_read+0x1b0/0x280\n vfs_read+0x17f/0x920\n ksys_read+0xf3/0x1c0\n do_syscall_64+0x5f/0x2e0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue may happen as follows:\n(1) Add kprobe tracepoint;\n(2) insmod test.ko;\n(3)  Module triggers ftrace disabled;\n(4) rmmod test.ko;\n(5) cat /proc/kallsyms; --> Will trigger UAF as test.ko already removed;\nftrace_mod_get_kallsym()\n...\nstrscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n...\n\nThe problem is when a module triggers an issue with ftrace and\nsets ftrace_disable. The ftrace_disable is set when an anomaly is\ndiscovered and to prevent any more damage, ftrace stops all text\nmodification. The issue that happened was that the ftrace_disable stops\nmore than just the text modification.\n\nWhen a module is loaded, its init functions can also be traced. Because\nkallsyms deletes the init functions after a module has loaded, ftrace\nsaves them when the module is loaded and function tracing is enabled. This\nallows the output of the function trace to show the init function names\ninstead of just their raw memory addresses.\n\nWhen a module is removed, ftrace_release_mod() is called, and if\nftrace_disable is set, it just returns without doing anything more. The\nproblem here is that it leaves the mod_list still around and if kallsyms\nis called, it will call into this code and access the module memory that\nhas already been freed as it will return:\n\n  strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n\nWhere the \"mod\" no longer exists and triggers a UAF bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb",
          "url": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9",
          "url": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa",
          "url": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71",
          "url": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c",
          "url": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb",
          "url": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129",
          "url": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d",
          "url": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53153",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Fix use after free for wext\n\nKey information in wext.connect is not reset on (re)connect and can hold\ndata from a previous connection.\n\nReset key data to avoid that drivers or mac80211 incorrectly detect a\nWEP connection request and access the freed or already reused memory.\n\nAdditionally optimize cfg80211_sme_connect() and avoid an useless\nschedule of conn_work.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b",
          "url": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747",
          "url": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7",
          "url": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9",
          "url": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2",
          "url": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6",
          "url": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7",
          "url": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4",
          "url": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50220",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix linkwatch use-after-free on disconnect\n\nusbnet uses the work usbnet_deferred_kevent() to perform tasks which may\nsleep.  On disconnect, completion of the work was originally awaited in\n->ndo_stop().  But in 2003, that was moved to ->disconnect() by historic\ncommit \"[PATCH] USB: usbnet, prevent exotic rtnl deadlock\":\n\n  https://git.kernel.org/tglx/history/c/0f138bbfd83c\n\nThe change was made because back then, the kernel's workqueue\nimplementation did not allow waiting for a single work.  One had to wait\nfor completion of *all* work by calling flush_scheduled_work(), and that\ncould deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex\nheld in ->ndo_stop().\n\nThe commit solved one problem but created another:  It causes a\nuse-after-free in USB Ethernet drivers aqc111.c, asix_devices.c,\nax88179_178a.c, ch9200.c and smsc75xx.c:\n\n* If the drivers receive a link change interrupt immediately before\n  disconnect, they raise EVENT_LINK_RESET in their (non-sleepable)\n  ->status() callback and schedule usbnet_deferred_kevent().\n* usbnet_deferred_kevent() invokes the driver's ->link_reset() callback,\n  which calls netif_carrier_{on,off}().\n* That in turn schedules the work linkwatch_event().\n\nBecause usbnet_deferred_kevent() is awaited after unregister_netdev(),\nnetif_carrier_{on,off}() may operate on an unregistered netdev and\nlinkwatch_event() may run after free_netdev(), causing a use-after-free.\n\nIn 2010, usbnet was changed to only wait for a single instance of\nusbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf\n(\"drivers/net: don't use flush_scheduled_work()\").\n\nUnfortunately the commit neglected to move the wait back to\n->ndo_stop().  Rectify that omission at long last.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50220"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/135199a2edd459d2b123144efcd7f9bcd95128e4",
          "url": "https://git.kernel.org/stable/c/135199a2edd459d2b123144efcd7f9bcd95128e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/635fd8953e4309b54ca6a81bed1d4a87668694f4",
          "url": "https://git.kernel.org/stable/c/635fd8953e4309b54ca6a81bed1d4a87668694f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7f77dcbc030c2faa6d8e8a594985eeb34018409e",
          "url": "https://git.kernel.org/stable/c/7f77dcbc030c2faa6d8e8a594985eeb34018409e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b4588b8b00b299be16a35be67b331d8fdba03f3",
          "url": "https://git.kernel.org/stable/c/8b4588b8b00b299be16a35be67b331d8fdba03f3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a69e617e533edddf3fa3123149900f36e0a6dc74",
          "url": "https://git.kernel.org/stable/c/a69e617e533edddf3fa3123149900f36e0a6dc74"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d2d6b530d89b0a912148018027386aa049f0a309",
          "url": "https://git.kernel.org/stable/c/d2d6b530d89b0a912148018027386aa049f0a309"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d49bb8cf9bfaa06aa527eb30f1a52a071da2e32f",
          "url": "https://git.kernel.org/stable/c/d49bb8cf9bfaa06aa527eb30f1a52a071da2e32f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db3b738ae5f726204876f4303c49cfdf4311403f",
          "url": "https://git.kernel.org/stable/c/db3b738ae5f726204876f4303c49cfdf4311403f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e2a521a7dcc463c5017b4426ca0804e151faeff7",
          "url": "https://git.kernel.org/stable/c/e2a521a7dcc463c5017b4426ca0804e151faeff7"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40154",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40154"
        }
      ],
      "release_date": "2025-11-12T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40186",
      "cwe": {
        "id": "CWE-826",
        "name": "Premature Release of Resource During Expected Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ntcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().\nsyzbot reported the splat below in tcp_conn_request(). [0]\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk->sk.\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req->rsk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\nLet's remove reqsk_fastopen_remove() in tcp_conn_request().\nNote that other callers make sure tp->fastopen_rsk is not NULL.\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff <0f> 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS:  00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n<IRQ>\ntcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\ntcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\ntcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\ntcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\nip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\nip6_input (net/ipv6/ip6_input.c:500)\nipv6_rcv (net/ipv6/ip6_input.c:311)\n__netif_receive_skb (net/core/dev.c:6104)\nprocess_backlog (net/core/dev.c:6456)\n__napi_poll (net/core/dev.c:7506)\nnet_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\nhandle_softirqs (kernel/softirq.c:579)\ndo_softirq (kernel/softirq.c:480)\n</IRQ>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40186"
        }
      ],
      "release_date": "2025-11-12T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38574",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npptp: ensure minimal skb length in pptp_xmit()\n\nCommit aabc6596ffb3 (\"net: ppp: Add bound checking for skb data\non ppp_sync_txmung\") fixed ppp_sync_txmunge()\n\nWe need a similar fix in pptp_xmit(), otherwise we might\nread uninit data as reported by syzbot.\n\nBUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline]\n  ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314\n  pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379\n  sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n  __release_sock+0x1d3/0x330 net/core/sock.c:3213\n  release_sock+0x6b/0x270 net/core/sock.c:3767\n  pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904\n  sock_sendmsg_nosec net/socket.c:712 [inline]\n  __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n  ____sys_sendmsg+0x893/0xd80 net/socket.c:2566\n  ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n  __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38574"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c",
          "url": "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d",
          "url": "https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611",
          "url": "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193",
          "url": "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c",
          "url": "https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f",
          "url": "https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb",
          "url": "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b",
          "url": "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba",
          "url": "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49975",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Don't redirect packets with invalid pkt_len\n\nSyzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any\nskbs, that is, the flow->head is null.\nThe root cause, as the [2] says, is because that bpf_prog_test_run_skb()\nrun a bpf prog which redirects empty skbs.\nSo we should determine whether the length of the packet modified by bpf\nprog or others like bpf_prog_test is valid before forwarding it directly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49975"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6204bf78b2a903b96ba43afff6abc0b04d6e0462",
          "url": "https://git.kernel.org/stable/c/6204bf78b2a903b96ba43afff6abc0b04d6e0462"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72f2dc8993f10262092745a88cb2dd0fef094f23",
          "url": "https://git.kernel.org/stable/c/72f2dc8993f10262092745a88cb2dd0fef094f23"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b68e53d56697a59b5c53893b53f508bbdf272a0",
          "url": "https://git.kernel.org/stable/c/8b68e53d56697a59b5c53893b53f508bbdf272a0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a75987714bd2d8e59840667a28e15c1fa5c47554",
          "url": "https://git.kernel.org/stable/c/a75987714bd2d8e59840667a28e15c1fa5c47554"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd1894224407c484f652ad456e1ce423e89bb3eb",
          "url": "https://git.kernel.org/stable/c/fd1894224407c484f652ad456e1ce423e89bb3eb"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50085",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev->raid_disks\nis greater than rs->raid_disks, so the loop touches one entry beyond\nthe allocated length.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50085"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a9faa704d83ff0b04387e385efd8ae21cd95af6",
          "url": "https://git.kernel.org/stable/c/2a9faa704d83ff0b04387e385efd8ae21cd95af6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3bfdc95466f5be4d8d95db5a5b470d61641a7c24",
          "url": "https://git.kernel.org/stable/c/3bfdc95466f5be4d8d95db5a5b470d61641a7c24"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/50235d9a1f1f742619ed9963cb9f240e5b821d46",
          "url": "https://git.kernel.org/stable/c/50235d9a1f1f742619ed9963cb9f240e5b821d46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71f601c779b3cc1baf497796f5b922c3fe5d2a1e",
          "url": "https://git.kernel.org/stable/c/71f601c779b3cc1baf497796f5b922c3fe5d2a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74af83732a39ab7d3bc9b49219a535853e25679f",
          "url": "https://git.kernel.org/stable/c/74af83732a39ab7d3bc9b49219a535853e25679f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dad24db59d2d2803576f2e3645728866a056dab",
          "url": "https://git.kernel.org/stable/c/7dad24db59d2d2803576f2e3645728866a056dab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2d47bef93fb74aa97d90f9a40ca657b8f376083",
          "url": "https://git.kernel.org/stable/c/c2d47bef93fb74aa97d90f9a40ca657b8f376083"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2f075e729636a44e98d9722e3852c2fa6fa49b6",
          "url": "https://git.kernel.org/stable/c/c2f075e729636a44e98d9722e3852c2fa6fa49b6"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53484",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib: cpu_rmap: Avoid use after free on rmap->obj array entries\n\nWhen calling irq_set_affinity_notifier() with NULL at the notify\nargument, it will cause freeing of the glue pointer in the\ncorresponding array entry but will leave the pointer in the array. A\nsubsequent call to free_irq_cpu_rmap() will try to free this entry again\nleading to possible use after free.\n\nFix that by setting NULL to the array entry and checking that we have\nnon-zero at the array entry when iterating over the array in\nfree_irq_cpu_rmap().\n\nThe current code does not suffer from this since there are no cases\nwhere irq_set_affinity_notifier(irq, NULL) (note the NULL passed for the\nnotify arg) is called, followed by a call to free_irq_cpu_rmap() so we\ndon't hit and issue. Subsequent patches in this series excersize this\nflow, hence the required fix.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53484"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4e0473f1060aa49621d40a113afde24818101d37",
          "url": "https://git.kernel.org/stable/c/4e0473f1060aa49621d40a113afde24818101d37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/67bca5f1d644f4e79b694abd8052a177de81c37f",
          "url": "https://git.kernel.org/stable/c/67bca5f1d644f4e79b694abd8052a177de81c37f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/981f339d2905b6a92ef59358158b326493aecac5",
          "url": "https://git.kernel.org/stable/c/981f339d2905b6a92ef59358158b326493aecac5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6ed54dd90698dc0744d669524cc1c122ded8a16",
          "url": "https://git.kernel.org/stable/c/c6ed54dd90698dc0744d669524cc1c122ded8a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c9115f49cf260d24d8b5f2d9a4b63cb31a627bb4",
          "url": "https://git.kernel.org/stable/c/c9115f49cf260d24d8b5f2d9a4b63cb31a627bb4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc2d2b3dbfb0ba57bc027fb7e1121250c50e4000",
          "url": "https://git.kernel.org/stable/c/cc2d2b3dbfb0ba57bc027fb7e1121250c50e4000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1308bd0b24cb1d78fa2747d5fa3e055cc628a48",
          "url": "https://git.kernel.org/stable/c/d1308bd0b24cb1d78fa2747d5fa3e055cc628a48"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f748e15253833b771acbede14ea98f50831ac289",
          "url": "https://git.kernel.org/stable/c/f748e15253833b771acbede14ea98f50831ac289"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39797",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: Duplicate SPI Handling\n\nThe issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI\nNetlink message, which triggers the kernel function xfrm_alloc_spi().\nThis function is expected to ensure uniqueness of the Security Parameter\nIndex (SPI) for inbound Security Associations (SAs). However, it can\nreturn success even when the requested SPI is already in use, leading\nto duplicate SPIs assigned to multiple inbound SAs, differentiated\nonly by their destination addresses.\n\nThis behavior causes inconsistencies during SPI lookups for inbound packets.\nSince the lookup may return an arbitrary SA among those with the same SPI,\npacket processing can fail, resulting in packet drops.\n\nAccording to RFC 4301 section 4.4.2 , for inbound processing a unicast SA\nis uniquely identified by the SPI and optionally protocol.\n\nReproducing the Issue Reliably:\nTo consistently reproduce the problem, restrict the available SPI range in\ncharon.conf : spi_min = 0x10000000 spi_max = 0x10000002\nThis limits the system to only 2 usable SPI values.\nNext, create more than 2 Child SA. each using unique pair of src/dst address.\nAs soon as the 3rd Child SA is initiated, it will be assigned a duplicate\nSPI, since the SPI pool is already exhausted.\nWith a narrow SPI range, the issue is consistently reproducible.\nWith a broader/default range, it becomes rare and unpredictable.\n\nCurrent implementation:\nxfrm_spi_hash() lookup function computes hash using daddr, proto, and family.\nSo if two SAs have the same SPI but different destination addresses, then\nthey will:\na. Hash into different buckets\nb. Be stored in different linked lists (byspi + h)\nc. Not be seen in the same hlist_for_each_entry_rcu() iteration.\nAs a result, the lookup will result in NULL and kernel allows that Duplicate SPI\n\nProposed Change:\nxfrm_state_lookup_spi_proto() does a truly global search - across all states,\nregardless of hash bucket and matches SPI and proto.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39797"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe",
          "url": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38",
          "url": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544",
          "url": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299",
          "url": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47",
          "url": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47"
        }
      ],
      "release_date": "2025-09-12T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39863",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work\n\nThe brcmf_btcoex_detach() only shuts down the btcoex timer, if the\nflag timer_on is false. However, the brcmf_btcoex_timerfunc(), which\nruns as timer handler, sets timer_on to false. This creates critical\nrace conditions:\n\n1.If brcmf_btcoex_detach() is called while brcmf_btcoex_timerfunc()\nis executing, it may observe timer_on as false and skip the call to\ntimer_shutdown_sync().\n\n2.The brcmf_btcoex_timerfunc() may then reschedule the brcmf_btcoex_info\nworker after the cancel_work_sync() has been executed, resulting in\nuse-after-free bugs.\n\nThe use-after-free bugs occur in two distinct scenarios, depending on\nthe timing of when the brcmf_btcoex_info struct is freed relative to\nthe execution of its worker thread.\n\nScenario 1: Freed before the worker is scheduled\n\nThe brcmf_btcoex_info is deallocated before the worker is scheduled.\nA race condition can occur when schedule_work(&bt_local->work) is\ncalled after the target memory has been freed. The sequence of events\nis detailed below:\n\nCPU0                           | CPU1\nbrcmf_btcoex_detach            | brcmf_btcoex_timerfunc\n                               |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)   |\n    ...                        |\n  cancel_work_sync();          |\n  ...                          |\n  kfree(cfg->btcoex); // FREE  |\n                               |   schedule_work(&bt_local->work); // USE\n\nScenario 2: Freed after the worker is scheduled\n\nThe brcmf_btcoex_info is freed after the worker has been scheduled\nbut before or during its execution. In this case, statements within\nthe brcmf_btcoex_handler() — such as the container_of macro and\nsubsequent dereferences of the brcmf_btcoex_info object will cause\na use-after-free access. The following timeline illustrates this\nscenario:\n\nCPU0                            | CPU1\nbrcmf_btcoex_detach             | brcmf_btcoex_timerfunc\n                                |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)    |\n    ...                         |\n  cancel_work_sync();           |\n  ...                           |   schedule_work(); // Reschedule\n                                |\n  kfree(cfg->btcoex); // FREE   |   brcmf_btcoex_handler() // Worker\n  /*                            |     btci = container_of(....); // USE\n   The kfree() above could      |     ...\n   also occur at any point      |     btci-> // USE\n   during the worker's execution|\n   */                           |\n\nTo resolve the race conditions, drop the conditional check and call\ntimer_shutdown_sync() directly. It can deactivate the timer reliably,\nregardless of its current state. Once stopped, the timer_on state is\nthen set to false.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39863"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625",
          "url": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7",
          "url": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc",
          "url": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63",
          "url": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39993",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmedia: rc: fix races with imon_disconnect()\nSyzbot reports a KASAN issue as below:\nBUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]\nBUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nRead of size 4 at addr ffff8880256fb000 by task syz-executor314/4465\nCPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n<TASK>\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:317 [inline]\nprint_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433\nkasan_report+0xb1/0x1e0 mm/kasan/report.c:495\n__create_pipe include/linux/usb.h:1945 [inline]\nsend_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nvfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991\nvfs_write+0x2d7/0xdd0 fs/read_write.c:576\nksys_write+0x127/0x250 fs/read_write.c:631\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nThe iMON driver improperly releases the usb_device reference in\nimon_disconnect without coordinating with active users of the\ndevice.\nSpecifically, the fields usbdev_intf0 and usbdev_intf1 are not\nprotected by the users counter (ictx->users). During probe,\nimon_init_intf0 or imon_init_intf1 increments the usb_device\nreference count depending on the interface. However, during\ndisconnect, usb_put_dev is called unconditionally, regardless of\nactual usage.\nAs a result, if vfd_write or other operations are still in\nprogress after disconnect, this can lead to a use-after-free of\nthe usb_device pointer.\nThread 1 vfd_write                      Thread 2 imon_disconnect\n...\nif\nusb_put_dev(ictx->usbdev_intf0)\nelse\nusb_put_dev(ictx->usbdev_intf1)\n...\nwhile\nsend_packet\nif\npipe = usb_sndintpipe(\nictx->usbdev_intf0) UAF\nelse\npipe = usb_sndctrlpipe(\nictx->usbdev_intf0, 0) UAF\nGuard access to usbdev_intf0 and usbdev_intf1 after disconnect by\nchecking ictx->disconnected in all writer paths. Add early return\nwith -ENODEV in send_packet(), vfd_write(), lcd_write() and\ndisplay_open() if the device is no longer present.\nSet and read ictx->disconnected under ictx->lock to ensure memory\nsynchronization. Acquire the lock in imon_disconnect() before setting\nthe flag to synchronize with any ongoing operations.\nEnsure writers exit early and safely after disconnect before the USB\ncore proceeds with cleanup.\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39993"
        }
      ],
      "release_date": "2025-10-15T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38556",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Harden s32ton() against conversion to 0 bits\n\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity.  Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\n\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38556"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a",
          "url": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491",
          "url": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7",
          "url": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
          "url": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
          "url": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
          "url": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2",
          "url": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d",
          "url": "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40277",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndrm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE\nThis data originates from userspace and is used in buffer offset\ncalculations which could potentially overflow causing an out-of-bounds\naccess.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40277"
        }
      ],
      "release_date": "2025-12-06T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39853",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix potential invalid access when MAC list is empty\n\nlist_first_entry() never returns NULL - if the list is empty, it still\nreturns a pointer to an invalid object, leading to potential invalid\nmemory access when dereferenced.\n\nFix this by using list_first_entry_or_null instead of list_first_entry.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39853"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1eadabcf5623f1237a539b16586b4ed8ac8dffcd",
          "url": "https://git.kernel.org/stable/c/1eadabcf5623f1237a539b16586b4ed8ac8dffcd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c6fb929afa313d9d11f780451d113f73922fe5d",
          "url": "https://git.kernel.org/stable/c/3c6fb929afa313d9d11f780451d113f73922fe5d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66e7cdbda74ee823ec2bf7b830ebd235c54f5ddf",
          "url": "https://git.kernel.org/stable/c/66e7cdbda74ee823ec2bf7b830ebd235c54f5ddf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/971feafe157afac443027acdc235badc6838560b",
          "url": "https://git.kernel.org/stable/c/971feafe157afac443027acdc235badc6838560b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c21fc4cebd44dd21016c61261a683af390343f8",
          "url": "https://git.kernel.org/stable/c/9c21fc4cebd44dd21016c61261a683af390343f8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a556f06338e1d5a85af0e32ecb46e365547f92b9",
          "url": "https://git.kernel.org/stable/c/a556f06338e1d5a85af0e32ecb46e365547f92b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e2a5e74879f9b494bbd66fa93f355feacde450c7",
          "url": "https://git.kernel.org/stable/c/e2a5e74879f9b494bbd66fa93f355feacde450c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb216d980fae6561c7c70af8ef826faf059c6515",
          "url": "https://git.kernel.org/stable/c/fb216d980fae6561c7c70af8ef826faf059c6515"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39691",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/buffer: fix use-after-free when call bh_read() helper\n\nThere's issue as follows:\nBUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110\nRead of size 8 at addr ffffc9000168f7f8 by task swapper/3/0\nCPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <IRQ>\n dump_stack_lvl+0x55/0x70\n print_address_description.constprop.0+0x2c/0x390\n print_report+0xb4/0x270\n kasan_report+0xb8/0xf0\n end_buffer_read_sync+0xe3/0x110\n end_bio_bh_io_sync+0x56/0x80\n blk_update_request+0x30a/0x720\n scsi_end_request+0x51/0x2b0\n scsi_io_completion+0xe3/0x480\n ? scsi_device_unbusy+0x11e/0x160\n blk_complete_reqs+0x7b/0x90\n handle_softirqs+0xef/0x370\n irq_exit_rcu+0xa5/0xd0\n sysvec_apic_timer_interrupt+0x6e/0x90\n </IRQ>\n\n Above issue happens when do ntfs3 filesystem mount, issue may happens\n as follows:\n           mount                            IRQ\nntfs_fill_super\n  read_cache_page\n    do_read_cache_folio\n      filemap_read_folio\n        mpage_read_folio\n\t do_mpage_readpage\n\t  ntfs_get_block_vbo\n\t   bh_read\n\t     submit_bh\n\t     wait_on_buffer(bh);\n\t                            blk_complete_reqs\n\t\t\t\t     scsi_io_completion\n\t\t\t\t      scsi_end_request\n\t\t\t\t       blk_update_request\n\t\t\t\t        end_bio_bh_io_sync\n\t\t\t\t\t end_buffer_read_sync\n\t\t\t\t\t  __end_buffer_read_notouch\n\t\t\t\t\t   unlock_buffer\n\n            wait_on_buffer(bh);--> return will return to caller\n\n\t\t\t\t\t  put_bh\n\t\t\t\t\t    --> trigger stack-out-of-bounds\nIn the mpage_read_folio() function, the stack variable 'map_bh' is\npassed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and\nwait_on_buffer() returns to continue processing, the stack variable\nis likely to be reclaimed. Consequently, during the end_buffer_read_sync()\nprocess, calling put_bh() may result in stack overrun.\n\nIf the bh is not allocated on the stack, it belongs to a folio.  Freeing\na buffer head which belongs to a folio is done by drop_buffers() which\nwill fail to free buffers which are still locked.  So it is safe to call\nput_bh() before __end_buffer_read_notouch().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39691"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03b40bf5d0389ca23ae6857ee25789f0e0b47ce8",
          "url": "https://git.kernel.org/stable/c/03b40bf5d0389ca23ae6857ee25789f0e0b47ce8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/042cf48ecf67f72c8b3846c7fac678f472712ff3",
          "url": "https://git.kernel.org/stable/c/042cf48ecf67f72c8b3846c7fac678f472712ff3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3169edb8945c295cf89120fc6b2c35cfe3ad4c9e",
          "url": "https://git.kernel.org/stable/c/3169edb8945c295cf89120fc6b2c35cfe3ad4c9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70a09115da586bf662c3bae9c0c4a1b99251fad9",
          "url": "https://git.kernel.org/stable/c/70a09115da586bf662c3bae9c0c4a1b99251fad9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49",
          "url": "https://git.kernel.org/stable/c/7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90b5193edb323fefbee0e4e5bc39ed89dcc37719",
          "url": "https://git.kernel.org/stable/c/90b5193edb323fefbee0e4e5bc39ed89dcc37719"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c58c6b532b7b69537cfd9ef701c7e37cdcf79dc4",
          "url": "https://git.kernel.org/stable/c/c58c6b532b7b69537cfd9ef701c7e37cdcf79dc4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5aa6ba1127307ab5dc3773eaf40d73a3423841f",
          "url": "https://git.kernel.org/stable/c/c5aa6ba1127307ab5dc3773eaf40d73a3423841f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38024",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcf/0x610 mm/kasan/report.c:489\n kasan_report+0xb5/0xe0 mm/kasan/report.c:602\n rxe_queue_cleanup+0xd0/0xe0 drivers/infiniband/sw/rxe/rxe_queue.c:195\n rxe_cq_cleanup+0x3f/0x50 drivers/infiniband/sw/rxe/rxe_cq.c:132\n __rxe_cleanup+0x168/0x300 drivers/infiniband/sw/rxe/rxe_pool.c:232\n rxe_create_cq+0x22e/0x3a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1109\n create_cq+0x658/0xb90 drivers/infiniband/core/uverbs_cmd.c:1052\n ib_uverbs_create_cq+0xc7/0x120 drivers/infiniband/core/uverbs_cmd.c:1095\n ib_uverbs_write+0x969/0xc90 drivers/infiniband/core/uverbs_main.c:679\n vfs_write fs/read_write.c:677 [inline]\n vfs_write+0x26a/0xcc0 fs/read_write.c:659\n ksys_write+0x1b8/0x200 fs/read_write.c:731\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nIn the function rxe_create_cq, when rxe_cq_from_init fails, the function\nrxe_cleanup will be called to handle the allocated resources. In fact,\nsome memory resources have already been freed in the function\nrxe_cq_from_init. Thus, this problem will occur.\n\nThe solution is to let rxe_cleanup do all the work.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38024"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16c45ced0b3839d3eee72a86bb172bef6cf58980",
          "url": "https://git.kernel.org/stable/c/16c45ced0b3839d3eee72a86bb172bef6cf58980"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/336edd6b0f5b7fbffc3e065285610624f59e88df",
          "url": "https://git.kernel.org/stable/c/336edd6b0f5b7fbffc3e065285610624f59e88df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a3b73e135e3bd18423d0baa72571319c7feb759",
          "url": "https://git.kernel.org/stable/c/3a3b73e135e3bd18423d0baa72571319c7feb759"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591",
          "url": "https://git.kernel.org/stable/c/52daccfc3fa68ee1902d52124921453d7a335591"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c7c80c32e00665234e373ab03fe82f5c5c2c230",
          "url": "https://git.kernel.org/stable/c/7c7c80c32e00665234e373ab03fe82f5c5c2c230"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee4c5a2a38596d548566560c0c022ab797e6f71a",
          "url": "https://git.kernel.org/stable/c/ee4c5a2a38596d548566560c0c022ab797e6f71a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f81b33582f9339d2dc17c69b92040d3650bb4bae",
          "url": "https://git.kernel.org/stable/c/f81b33582f9339d2dc17c69b92040d3650bb4bae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8f470e3a757425a8f98fb9a5991e3cf62fc7134",
          "url": "https://git.kernel.org/stable/c/f8f470e3a757425a8f98fb9a5991e3cf62fc7134"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37823",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don't have a reliable reproducer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e",
          "url": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc",
          "url": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e",
          "url": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf",
          "url": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290",
          "url": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09",
          "url": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c",
          "url": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a",
          "url": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53673",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_event: call disconnect callback before deleting conn\n\nIn hci_cs_disconnect, we do hci_conn_del even if disconnection failed.\n\nISO, L2CAP and SCO connections refer to the hci_conn without\nhci_conn_get, so disconn_cfm must be called so they can clean up their\nconn, otherwise use-after-free occurs.\n\nISO:\n==========================================================\niso_sock_connect:880: sk 00000000eabd6557\niso_connect_cis:356: 70:1a:b8:98:ff:a2 -> 28:3d:c2:4a:7e:da\n...\niso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073\nhci_dev_put:1487: hci0 orig refcnt 17\n__iso_chan_add:214: conn 00000000b6251073\niso_sock_clear_timer:117: sock 00000000eabd6557 state 3\n...\nhci_rx_work:4085: hci0 Event packet\nhci_event_packet:7601: hci0: event 0x0f\nhci_cmd_status_evt:4346: hci0: opcode 0x0406\nhci_cs_disconnect:2760: hci0: status 0x0c\nhci_sent_cmd_data:3107: hci0 opcode 0x0406\nhci_conn_del:1151: hci0 hcon 000000001696f1fd handle 2560\nhci_conn_unlink:1102: hci0: hcon 000000001696f1fd\nhci_conn_drop:1451: hcon 00000000d8521aaf orig refcnt 2\nhci_chan_list_flush:2780: hcon 000000001696f1fd\nhci_dev_put:1487: hci0 orig refcnt 21\nhci_dev_put:1487: hci0 orig refcnt 20\nhci_req_cmd_complete:3978: opcode 0x0406 status 0x0c\n... <no iso_* activity on sk/conn> ...\niso_sock_sendmsg:1098: sock 00000000dea5e2e0, sk 00000000eabd6557\nBUG: kernel NULL pointer dereference, address: 0000000000000668\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP PTI\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014\nRIP: 0010:iso_sock_sendmsg (net/bluetooth/iso.c:1112) bluetooth\n==========================================================\n\nL2CAP:\n==================================================================\nhci_cmd_status_evt:4359: hci0: opcode 0x0406\nhci_cs_disconnect:2760: hci0: status 0x0c\nhci_sent_cmd_data:3085: hci0 opcode 0x0406\nhci_conn_del:1151: hci0 hcon ffff88800c999000 handle 3585\nhci_conn_unlink:1102: hci0: hcon ffff88800c999000\nhci_chan_list_flush:2780: hcon ffff88800c999000\nhci_chan_del:2761: hci0 hcon ffff88800c999000 chan ffff888018ddd280\n...\nBUG: KASAN: slab-use-after-free in hci_send_acl+0x2d/0x540 [bluetooth]\nRead of size 8 at addr ffff888018ddd298 by task bluetoothd/1175\n\nCPU: 0 PID: 1175 Comm: bluetoothd Tainted: G            E      6.4.0-rc4+ #2\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014\nCall Trace:\n <TASK>\n dump_stack_lvl+0x5b/0x90\n print_report+0xcf/0x670\n ? __virt_addr_valid+0xf8/0x180\n ? hci_send_acl+0x2d/0x540 [bluetooth]\n kasan_report+0xa8/0xe0\n ? hci_send_acl+0x2d/0x540 [bluetooth]\n hci_send_acl+0x2d/0x540 [bluetooth]\n ? __pfx___lock_acquire+0x10/0x10\n l2cap_chan_send+0x1fd/0x1300 [bluetooth]\n ? l2cap_sock_sendmsg+0xf2/0x170 [bluetooth]\n ? __pfx_l2cap_chan_send+0x10/0x10 [bluetooth]\n ? lock_release+0x1d5/0x3c0\n ? mark_held_locks+0x1a/0x90\n l2cap_sock_sendmsg+0x100/0x170 [bluetooth]\n sock_write_iter+0x275/0x280\n ? __pfx_sock_write_iter+0x10/0x10\n ? __pfx___lock_acquire+0x10/0x10\n do_iter_readv_writev+0x176/0x220\n ? __pfx_do_iter_readv_writev+0x10/0x10\n ? find_held_lock+0x83/0xa0\n ? selinux_file_permission+0x13e/0x210\n do_iter_write+0xda/0x340\n vfs_writev+0x1b4/0x400\n ? __pfx_vfs_writev+0x10/0x10\n ? __seccomp_filter+0x112/0x750\n ? populate_seccomp_data+0x182/0x220\n ? __fget_light+0xdf/0x100\n ? do_writev+0x19d/0x210\n do_writev+0x19d/0x210\n ? __pfx_do_writev+0x10/0x10\n ? mark_held_locks+0x1a/0x90\n do_syscall_64+0x60/0x90\n ? lockdep_hardirqs_on_prepare+0x149/0x210\n ? do_syscall_64+0x6c/0x90\n ? lockdep_hardirqs_on_prepare+0x149/0x210\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7ff45cb23e64\nCode: 15 d1 1f 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d 9d a7 0d 00 00 74 13 b8 14 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89\nRSP: 002b:00007fff21ae09b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000014\nRAX: ffffffffffffffda RBX: \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53673"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/093a07052406b363b1b2ab489e17dbadaf3e509b",
          "url": "https://git.kernel.org/stable/c/093a07052406b363b1b2ab489e17dbadaf3e509b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1ecf6dc2676ead4b927c50b1be0851fa4d756574",
          "url": "https://git.kernel.org/stable/c/1ecf6dc2676ead4b927c50b1be0851fa4d756574"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/59bd1e476bbc7bc6dff3c61bba787095a4839796",
          "url": "https://git.kernel.org/stable/c/59bd1e476bbc7bc6dff3c61bba787095a4839796"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7f7cfcb6f0825652973b780f248603e23f16ee90",
          "url": "https://git.kernel.org/stable/c/7f7cfcb6f0825652973b780f248603e23f16ee90"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38198",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Make sure modelist not set on unregistered console\n\nIt looks like attempting to write to the \"store_modes\" sysfs node will\nrun afoul of unregistered consoles:\n\nUBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28\nindex -1 is out of range for type 'fb_info *[32]'\n...\n fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122\n fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048\n fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673\n store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113\n dev_attr_store+0x55/0x80 drivers/base/core.c:2439\n\nstatic struct fb_info *fbcon_registered_fb[FB_MAX];\n...\nstatic signed char con2fb_map[MAX_NR_CONSOLES];\n...\nstatic struct fb_info *fbcon_info_from_console(int console)\n...\n        return fbcon_registered_fb[con2fb_map[console]];\n\nIf con2fb_map contains a -1 things go wrong here. Instead, return NULL,\nas callers of fbcon_info_from_console() are trying to compare against\nexisting \"info\" pointers, so error handling should kick in correctly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38198"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc",
          "url": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b",
          "url": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b",
          "url": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8",
          "url": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd",
          "url": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53432",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: net: fix use after free in fwnet_finish_incoming_packet()\n\nThe netif_rx() function frees the skb so we can't dereference it to\nsave the skb->len.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53432"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ea70379e4f4efa95c9daa7f3f9bdd4d40aec927",
          "url": "https://git.kernel.org/stable/c/2ea70379e4f4efa95c9daa7f3f9bdd4d40aec927"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ff256751a2853e1ffaa36958ff933ccc98c6cb5",
          "url": "https://git.kernel.org/stable/c/3ff256751a2853e1ffaa36958ff933ccc98c6cb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9040adc38cf6bfbb77034d558ac2c52f70d840ac",
          "url": "https://git.kernel.org/stable/c/9040adc38cf6bfbb77034d558ac2c52f70d840ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9860921ab4521252dc39bb21b9c936bd09a00982",
          "url": "https://git.kernel.org/stable/c/9860921ab4521252dc39bb21b9c936bd09a00982"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38729",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Validate UAC3 power domain descriptors, too\n\nUAC3 power domain descriptors need to be verified with its variable\nbLength for avoiding the unexpected OOB accesses by malicious\nfirmware, too.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38729"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/07c8d78dbb5e0ff8b23f7fd69cd1d4e2ba22b3dc",
          "url": "https://git.kernel.org/stable/c/07c8d78dbb5e0ff8b23f7fd69cd1d4e2ba22b3dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1666207ba0a5973735ef010812536adde6174e81",
          "url": "https://git.kernel.org/stable/c/1666207ba0a5973735ef010812536adde6174e81"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29b415ec09f5b9d1dfa2423b826725a8c8796b9a",
          "url": "https://git.kernel.org/stable/c/29b415ec09f5b9d1dfa2423b826725a8c8796b9a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40714daf4d0448e1692c78563faf0ed0f9d9b5c7",
          "url": "https://git.kernel.org/stable/c/40714daf4d0448e1692c78563faf0ed0f9d9b5c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/452ad54f432675982cc0d6eb6c40a6c86ac61dbd",
          "url": "https://git.kernel.org/stable/c/452ad54f432675982cc0d6eb6c40a6c86ac61dbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd08d390d15b204cac1d3174f5f149a20c52e61a",
          "url": "https://git.kernel.org/stable/c/cd08d390d15b204cac1d3174f5f149a20c52e61a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d832ccbc301fbd9e5a1d691bdcf461cdb514595f",
          "url": "https://git.kernel.org/stable/c/d832ccbc301fbd9e5a1d691bdcf461cdb514595f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ebc9e06b6ea978a20abf9b87d41afc51b2d745ac",
          "url": "https://git.kernel.org/stable/c/ebc9e06b6ea978a20abf9b87d41afc51b2d745ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f03418bb9d542f44df78eec2eff4ac83c0a8ac0d",
          "url": "https://git.kernel.org/stable/c/f03418bb9d542f44df78eec2eff4ac83c0a8ac0d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38680",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()\n\nThe buffer length check before calling uvc_parse_format() only ensured\nthat the buffer has at least 3 bytes (buflen > 2), buf the function\naccesses buffer[3], requiring at least 4 bytes.\n\nThis can lead to an out-of-bounds read if the buffer has exactly 3 bytes.\n\nFix it by checking that the buffer has at least 4 bytes in\nuvc_parse_format().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38680"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e269581b3aa5962fdc52757ab40da286168c087",
          "url": "https://git.kernel.org/stable/c/1e269581b3aa5962fdc52757ab40da286168c087"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/424980d33b3f816485513e538610168b03fab9f1",
          "url": "https://git.kernel.org/stable/c/424980d33b3f816485513e538610168b03fab9f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d4a7c0b296162354b6fc759a1475b9d57ddfaa6",
          "url": "https://git.kernel.org/stable/c/6d4a7c0b296162354b6fc759a1475b9d57ddfaa6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/782b6a718651eda3478b1824b37a8b3185d2740c",
          "url": "https://git.kernel.org/stable/c/782b6a718651eda3478b1824b37a8b3185d2740c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8343f3fe0b755925f83d60b05e92bf4396879758",
          "url": "https://git.kernel.org/stable/c/8343f3fe0b755925f83d60b05e92bf4396879758"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ad554217c9b945031c73df4e8176a475e2dea57",
          "url": "https://git.kernel.org/stable/c/9ad554217c9b945031c73df4e8176a475e2dea57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9",
          "url": "https://git.kernel.org/stable/c/a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cac702a439050df65272c49184aef7975fe3eff2",
          "url": "https://git.kernel.org/stable/c/cac702a439050df65272c49184aef7975fe3eff2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ffdd82182953df643aa63d999b6f1653d0c93778",
          "url": "https://git.kernel.org/stable/c/ffdd82182953df643aa63d999b6f1653d0c93778"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-54015",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/mlx5: Devcom, fix error flow in mlx5_devcom_register_device\nIn case devcom allocation is failed, mlx5 is always freeing the priv.\nHowever, this priv might have been allocated by a different thread,\nand freeing it might lead to use-after-free bugs.\nFix it by freeing the priv only in case it was allocated by the\nrunning thread.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-54015"
        }
      ],
      "release_date": "2025-12-24T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-53090",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix an illegal memory access\n\nIn the kfd_wait_on_events() function, the kfd_event_waiter structure is\nallocated by alloc_event_waiters(), but the event field of the waiter\nstructure is not initialized; When copy_from_user() fails in the\nkfd_wait_on_events() function, it will enter exception handling to\nrelease the previously allocated memory of the waiter structure;\nDue to the event field of the waiters structure being accessed\nin the free_waiters() function, this results in illegal memory access\nand system crash, here is the crash log:\n\nlocalhost kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x185/0x1e0\nlocalhost kernel: RSP: 0018:ffffaa53c362bd60 EFLAGS: 00010082\nlocalhost kernel: RAX: ff3d3d6bff4007cb RBX: 0000000000000282 RCX: 00000000002c0000\nlocalhost kernel: RDX: ffff9e855eeacb80 RSI: 000000000000279c RDI: ffffe7088f6a21d0\nlocalhost kernel: RBP: ffffe7088f6a21d0 R08: 00000000002c0000 R09: ffffaa53c362be64\nlocalhost kernel: R10: ffffaa53c362bbd8 R11: 0000000000000001 R12: 0000000000000002\nlocalhost kernel: R13: ffff9e7ead15d600 R14: 0000000000000000 R15: ffff9e7ead15d698\nlocalhost kernel: FS:  0000152a3d111700(0000) GS:ffff9e855ee80000(0000) knlGS:0000000000000000\nlocalhost kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nlocalhost kernel: CR2: 0000152938000010 CR3: 000000044d7a4000 CR4: 00000000003506e0\nlocalhost kernel: Call Trace:\nlocalhost kernel: _raw_spin_lock_irqsave+0x30/0x40\nlocalhost kernel: remove_wait_queue+0x12/0x50\nlocalhost kernel: kfd_wait_on_events+0x1b6/0x490 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: kfd_ioctl+0x38c/0x4a0 [hydcu]\nlocalhost kernel: ? kfd_ioctl_set_trap_handler+0x70/0x70 [hydcu]\nlocalhost kernel: ? kfd_ioctl_create_queue+0x5a0/0x5a0 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: __x64_sys_ioctl+0x8e/0xd0\nlocalhost kernel: ? syscall_trace_enter.isra.18+0x143/0x1b0\nlocalhost kernel: do_syscall_64+0x33/0x80\nlocalhost kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9\nlocalhost kernel: RIP: 0033:0x152a4dff68d7\n\nAllocate the structure with kcalloc, and remove redundant 0-initialization\nand a redundant loop condition check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53090"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fece63b55c5d74cd6f5de51159e2cde37e10555",
          "url": "https://git.kernel.org/stable/c/2fece63b55c5d74cd6f5de51159e2cde37e10555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fc8fff378b2f2039f2a666d9f8c570f4e58352c",
          "url": "https://git.kernel.org/stable/c/4fc8fff378b2f2039f2a666d9f8c570f4e58352c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a3fb3b745af0ce46ec2e0c8e507bae45b937334",
          "url": "https://git.kernel.org/stable/c/5a3fb3b745af0ce46ec2e0c8e507bae45b937334"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61f306f8df0d5559659c5578cf6d95236bcdcb25",
          "url": "https://git.kernel.org/stable/c/61f306f8df0d5559659c5578cf6d95236bcdcb25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6936525142a015e854d0a23e9ad9ea0a28b3843d",
          "url": "https://git.kernel.org/stable/c/6936525142a015e854d0a23e9ad9ea0a28b3843d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbf5eada4334a96e3a204b2307ff5b14dc380b0b",
          "url": "https://git.kernel.org/stable/c/bbf5eada4334a96e3a204b2307ff5b14dc380b0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d9923e7214a870b312bf61f6a89c7554d0966985",
          "url": "https://git.kernel.org/stable/c/d9923e7214a870b312bf61f6a89c7554d0966985"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38702",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fix potential buffer overflow in do_register_framebuffer()\n\nThe current implementation may lead to buffer overflow when:\n1.  Unregistration creates NULL gaps in registered_fb[]\n2.  All array slots become occupied despite num_registered_fb < FB_MAX\n3.  The registration loop exceeds array bounds\n\nAdd boundary check to prevent registered_fb[FB_MAX] access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38702"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399",
          "url": "https://git.kernel.org/stable/c/248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2828a433c7d7a05b6f27c8148502095101dd0b09",
          "url": "https://git.kernel.org/stable/c/2828a433c7d7a05b6f27c8148502095101dd0b09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/523b84dc7ccea9c4d79126d6ed1cf9033cf83b05",
          "url": "https://git.kernel.org/stable/c/523b84dc7ccea9c4d79126d6ed1cf9033cf83b05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c3f5a25c62230b7965804ce7a2e9305c3ca3961",
          "url": "https://git.kernel.org/stable/c/5c3f5a25c62230b7965804ce7a2e9305c3ca3961"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/806f85bdd3a60187c21437fc51baace11f659f35",
          "url": "https://git.kernel.org/stable/c/806f85bdd3a60187c21437fc51baace11f659f35"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cbe740de32bb0fb7a5213731ff5f26ea6718fca3",
          "url": "https://git.kernel.org/stable/c/cbe740de32bb0fb7a5213731ff5f26ea6718fca3"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40248",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nvsock: Ignore signal/timeout on connect() if already established\nDuring connect(), acting on a signal/timeout by disconnecting an already\nestablished socket leads to several issues:\n1. connect() invoking vsock_transport_cancel_pkt() ->\nvirtio_transport_purge_skbs() may race with sendmsg() invoking\nvirtio_transport_get_credit(). This results in a permanently elevated\n`vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.\n2. connect() resetting a connected socket's state may race with socket\nbeing placed in a sockmap. A disconnected socket remaining in a sockmap\nbreaks sockmap's assumptions. And gives rise to WARNs.\n3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a\ntransport change/drop after TCP_ESTABLISHED. Which poses a problem for\nany simultaneous sendmsg() or connect() and may result in a\nuse-after-free/null-ptr-deref.\nDo not disconnect socket on signal/timeout. Keep the logic for unconnected\nsockets: they don't linger, can't be placed in a sockmap, are rejected by\nsendmsg().\n[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/\n[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/\n[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40248"
        }
      ],
      "release_date": "2025-12-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-54072",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nALSA: pcm: Fix potential data race at PCM memory allocation helpers\nThe PCM memory allocation helpers have a sanity check against too many\nbuffer allocations.  However, the check is performed without a proper\nlock and the allocation isn't serialized; this allows user to allocate\nmore memories than predefined max size.\nPractically seen, this isn't really a big problem, as it's more or\nless some \"soft limit\" as a sanity check, and it's not possible to\nallocate unlimitedly.  But it's still better to address this for more\nconsistent behavior.\nThe patch covers the size check in do_alloc_pages() with the\ncard->memory_mutex, and increases the allocated size there for\npreventing the further overflow.  When the actual allocation fails,\nthe size is decreased accordingly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-54072"
        }
      ],
      "release_date": "2025-12-24T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-40258",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmptcp: fix race condition in mptcp_schedule_work()\nsyzbot reported use-after-free in mptcp_schedule_work() [1]\nIssue here is that mptcp_schedule_work() schedules a work,\nthen gets a refcount on sk->sk_refcnt if the work was scheduled.\nThis refcount will be released by mptcp_worker().\n[A] if (schedule_work(...)) {\n[B]     sock_hold(sk);\nreturn true;\n}\nProblem is that mptcp_worker() can run immediately and complete before [B]\nWe need instead :\nsock_hold(sk);\nif (schedule_work(...))\nreturn true;\nsock_put(sk);\n[1]\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 1 PID: 29 at lib/refcount.c:25 refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:25\nCall Trace:\n<TASK>\n__refcount_add include/linux/refcount.h:-1 [inline]\n__refcount_inc include/linux/refcount.h:366 [inline]\nrefcount_inc include/linux/refcount.h:383 [inline]\nsock_hold include/net/sock.h:816 [inline]\nmptcp_schedule_work+0x164/0x1a0 net/mptcp/protocol.c:943\nmptcp_tout_timer+0x21/0xa0 net/mptcp/protocol.c:2316\ncall_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747\nexpire_timers kernel/time/timer.c:1798 [inline]\n__run_timers kernel/time/timer.c:2372 [inline]\n__run_timer_base+0x648/0x970 kernel/time/timer.c:2384\nrun_timer_base kernel/time/timer.c:2393 [inline]\nrun_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403\nhandle_softirqs+0x22f/0x710 kernel/softirq.c:622\n__do_softirq kernel/softirq.c:656 [inline]\nrun_ktimerd+0xcf/0x190 kernel/softirq.c:1138\nsmpboot_thread_fn+0x542/0xa60 kernel/smpboot.c:160\nkthread+0x711/0x8a0 kernel/kthread.c:463\nret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158\nret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40258"
        }
      ],
      "release_date": "2025-12-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-40269",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nALSA: usb-audio: Fix potential overflow of PCM transfer buffer\nThe PCM stream data in USB-audio driver is transferred over USB URB\npacket buffers, and each packet size is determined dynamically.  The\npacket sizes are limited by some factors such as wMaxPacketSize USB\ndescriptor.  OTOH, in the current code, the actually used packet sizes\nare determined only by the rate and the PPS, which may be bigger than\nthe size limit above.  This results in a buffer overflow, as reported\nby syzbot.\nBasically when the limit is smaller than the calculated packet size,\nit implies that something is wrong, most likely a weird USB\ndescriptor.  So the best option would be just to return an error at\nthe parameter setup time before doing any further operations.\nThis patch introduces such a sanity check, and returns -EINVAL when\nthe packet size is greater than maxpacksize.  The comparison with\nep->packsize[1] alone should suffice since it's always equal or\ngreater than ep->packsize[0].",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40269"
        }
      ],
      "release_date": "2025-12-06T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-68349",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\nFixes a crash when layout is null during this call stack:\nwrite_inode\n-> nfs4_write_inode\n-> pnfs_layoutcommit_inode\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-68349"
        }
      ],
      "release_date": "2025-12-24T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53117",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53117"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69",
          "url": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4",
          "url": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf",
          "url": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830",
          "url": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06",
          "url": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a",
          "url": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b",
          "url": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315",
          "url": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53259",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF\n\nThe call to get_user_pages_fast() in vmci_host_setup_notify() can return\nNULL context->notify_page causing a GPF. To avoid GPF check if\ncontext->notify_page == NULL and return error if so.\n\ngeneral protection fault, probably for non-canonical address\n    0xe0009d1000000060: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0x0005088000000300-\n    0x0005088000000307]\nCPU: 2 PID: 26180 Comm: repro_34802241 Not tainted 6.1.0-rc4 #1\nHardware name: Red Hat KVM, BIOS 1.15.0-2.module+el8.6.0 04/01/2014\nRIP: 0010:vmci_ctx_check_signal_notify+0x91/0xe0\nCall Trace:\n <TASK>\n vmci_host_unlocked_ioctl+0x362/0x1f40\n __x64_sys_ioctl+0x1a1/0x230\n do_syscall_64+0x3a/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53259"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/055891397f530f9b1b22be38d7eca8b08382941f",
          "url": "https://git.kernel.org/stable/c/055891397f530f9b1b22be38d7eca8b08382941f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a726cb47fd204109c767409fa9ca15a96328f14",
          "url": "https://git.kernel.org/stable/c/1a726cb47fd204109c767409fa9ca15a96328f14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1",
          "url": "https://git.kernel.org/stable/c/91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3c89e8c69a58f62451c0a75b77fcab25979b897",
          "url": "https://git.kernel.org/stable/c/a3c89e8c69a58f62451c0a75b77fcab25979b897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4239bfb260d1e6837766c41a0b241d7670f1402",
          "url": "https://git.kernel.org/stable/c/b4239bfb260d1e6837766c41a0b241d7670f1402"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d4198f67e7556b1507f14f60d81a72660e5560e4",
          "url": "https://git.kernel.org/stable/c/d4198f67e7556b1507f14f60d81a72660e5560e4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50406",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: iomap: fix memory corruption when recording errors during writeback\n\nEvery now and then I see this crash on arm64:\n\nUnable to handle kernel NULL pointer dereference at virtual address 00000000000000f8\nBuffer I/O error on dev dm-0, logical block 8733687, async page read\nMem abort info:\n  ESR = 0x0000000096000006\n  EC = 0x25: DABT (current EL), IL = 32 bits\n  SET = 0, FnV = 0\n  EA = 0, S1PTW = 0\n  FSC = 0x06: level 2 translation fault\nData abort info:\n  ISV = 0, ISS = 0x00000006\n  CM = 0, WnR = 0\nuser pgtable: 64k pages, 42-bit VAs, pgdp=0000000139750000\n[00000000000000f8] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000, pmd=0000000000000000\nInternal error: Oops: 96000006 [#1] PREEMPT SMP\nBuffer I/O error on dev dm-0, logical block 8733688, async page read\nDumping ftrace buffer:\nBuffer I/O error on dev dm-0, logical block 8733689, async page read\n   (ftrace buffer empty)\nXFS (dm-0): log I/O error -5\nModules linked in: dm_thin_pool dm_persistent_data\nXFS (dm-0): Metadata I/O Error (0x1) detected at xfs_trans_read_buf_map+0x1ec/0x590 [xfs] (fs/xfs/xfs_trans_buf.c:296).\n dm_bio_prison\nXFS (dm-0): Please unmount the filesystem and rectify the problem(s)\nXFS (dm-0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -5, agno 0\n dm_bufio dm_log_writes xfs nft_chain_nat xt_REDIRECT nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_REJECT\npotentially unexpected fatal signal 6.\n nf_reject_ipv6\npotentially unexpected fatal signal 6.\n ipt_REJECT nf_reject_ipv4\nCPU: 1 PID: 122166 Comm: fsstress Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7\n rpcsec_gss_krb5 auth_rpcgss xt_tcpudp ip_set_hash_ip ip_set_hash_net xt_set nft_compat ip_set_hash_mac ip_set nf_tables\nHardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021\npstate: 60001000 (nZCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)\n ip_tables\npc : 000003fd6d7df200\n x_tables\nlr : 000003fd6d7df1ec\n overlay nfsv4\nCPU: 0 PID: 54031 Comm: u4:3 Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7405\nHardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021\nWorkqueue: writeback wb_workfn\nsp : 000003ffd9522fd0\n (flush-253:0)\npstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)\npc : errseq_set+0x1c/0x100\nx29: 000003ffd9522fd0 x28: 0000000000000023 x27: 000002acefeb6780\nx26: 0000000000000005 x25: 0000000000000001 x24: 0000000000000000\nx23: 00000000ffffffff x22: 0000000000000005\nlr : __filemap_set_wb_err+0x24/0xe0\n x21: 0000000000000006\nsp : fffffe000f80f760\nx29: fffffe000f80f760 x28: 0000000000000003 x27: fffffe000f80f9f8\nx26: 0000000002523000 x25: 00000000fffffffb x24: fffffe000f80f868\nx23: fffffe000f80fbb0 x22: fffffc0180c26a78 x21: 0000000002530000\nx20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000\n\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000001 x13: 0000000000470af3 x12: fffffc0058f70000\nx11: 0000000000000040 x10: 0000000000001b20 x9 : fffffe000836b288\nx8 : fffffc00eb9fd480 x7 : 0000000000f83659 x6 : 0000000000000000\nx5 : 0000000000000869 x4 : 0000000000000005 x3 : 00000000000000f8\nx20: 000003fd6d740020 x19: 000000000001dd36 x18: 0000000000000001\nx17: 000003fd6d78704c x16: 0000000000000001 x15: 000002acfac87668\nx2 : 0000000000000ffa x1 : 00000000fffffffb x0 : 00000000000000f8\nCall trace:\n errseq_set+0x1c/0x100\n __filemap_set_wb_err+0x24/0xe0\n iomap_do_writepage+0x5e4/0xd5c\n write_cache_pages+0x208/0x674\n iomap_writepages+0x34/0x60\n xfs_vm_writepages+0x8c/0xcc [xfs 7a861f39c43631f15d3a5884246ba5035d4ca78b]\nx14: 0000000000000000 x13: 2064656e72757465 x12: 0000000000002180\nx11: 000003fd6d8a82d0 x10: 0000000000000000 x9 : 000003fd6d8ae288\nx8 : 0000000000000083 x7 : 00000000ffffffff x6 : 00000000ffffffee\nx5 : 00000000fbad2887 x4 : 000003fd6d9abb58 x3 : 000003fd6d740020\nx2 : 0000000000000006 x1 : 000000000001dd36 x0 : 0000000000000000\nCPU: \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50406"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2",
          "url": "https://git.kernel.org/stable/c/3d5f3ba1ac28059bdf7000cae2403e4e984308d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2",
          "url": "https://git.kernel.org/stable/c/7308591d9c7787aec58f6a01a7823f14e90db7a2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6",
          "url": "https://git.kernel.org/stable/c/82c66c46f73b88be74c869e2cbfef45281adf3c6"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53668",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix deadloop issue on reading trace_pipe\n\nSoft lockup occurs when reading file 'trace_pipe':\n\n  watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488]\n  [...]\n  RIP: 0010:ring_buffer_empty_cpu+0xed/0x170\n  RSP: 0018:ffff88810dd6fc48 EFLAGS: 00000246\n  RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff93d1aaeb\n  RDX: ffff88810a280040 RSI: 0000000000000008 RDI: ffff88811164b218\n  RBP: ffff88811164b218 R08: 0000000000000000 R09: ffff88815156600f\n  R10: ffffed102a2acc01 R11: 0000000000000001 R12: 0000000051651901\n  R13: 0000000000000000 R14: ffff888115e49500 R15: 0000000000000000\n  [...]\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f8d853c2000 CR3: 000000010dcd8000 CR4: 00000000000006e0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   __find_next_entry+0x1a8/0x4b0\n   ? peek_next_entry+0x250/0x250\n   ? down_write+0xa5/0x120\n   ? down_write_killable+0x130/0x130\n   trace_find_next_entry_inc+0x3b/0x1d0\n   tracing_read_pipe+0x423/0xae0\n   ? tracing_splice_read_pipe+0xcb0/0xcb0\n   vfs_read+0x16b/0x490\n   ksys_read+0x105/0x210\n   ? __ia32_sys_pwrite64+0x200/0x200\n   ? switch_fpu_return+0x108/0x220\n   do_syscall_64+0x33/0x40\n   entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThrough the vmcore, I found it's because in tracing_read_pipe(),\nring_buffer_empty_cpu() found some buffer is not empty but then it\ncannot read anything due to \"rb_num_of_entries() == 0\" always true,\nThen it infinitely loop the procedure due to user buffer not been\nfilled, see following code path:\n\n  tracing_read_pipe() {\n    ... ...\n    waitagain:\n      tracing_wait_pipe() // 1. find non-empty buffer here\n      trace_find_next_entry_inc()  // 2. loop here try to find an entry\n        __find_next_entry()\n          ring_buffer_empty_cpu();  // 3. find non-empty buffer\n          peek_next_entry()  // 4. but peek always return NULL\n            ring_buffer_peek()\n              rb_buffer_peek()\n                rb_get_reader_page()\n                  // 5. because rb_num_of_entries() == 0 always true here\n                  //    then return NULL\n      // 6. user buffer not been filled so goto 'waitgain'\n      //    and eventually leads to an deadloop in kernel!!!\n  }\n\nBy some analyzing, I found that when resetting ringbuffer, the 'entries'\nof its pages are not all cleared (see rb_reset_cpu()). Then when reducing\nthe ringbuffer, and if some reduced pages exist dirty 'entries' data, they\nwill be added into 'cpu_buffer->overrun' (see rb_remove_pages()), which\ncause wrong 'overrun' count and eventually cause the deadloop issue.\n\nTo fix it, we need to clear every pages in rb_reset_cpu().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53668"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a29dae5786d263016a9aceb1e56bf3fd4cc6fa0",
          "url": "https://git.kernel.org/stable/c/0a29dae5786d263016a9aceb1e56bf3fd4cc6fa0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27bdd93e44cc28dd9b94893fae146b83d4f5b31e",
          "url": "https://git.kernel.org/stable/c/27bdd93e44cc28dd9b94893fae146b83d4f5b31e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e68f1f3a20fe9b6bde018e353269fbfa289609c",
          "url": "https://git.kernel.org/stable/c/5e68f1f3a20fe9b6bde018e353269fbfa289609c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e42907f3a7b4ce3a2d1757f6d78336984daf8f5",
          "url": "https://git.kernel.org/stable/c/7e42907f3a7b4ce3a2d1757f6d78336984daf8f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b0b63fdac6b70a45614e7d4b30e5bbb93deb007",
          "url": "https://git.kernel.org/stable/c/8b0b63fdac6b70a45614e7d4b30e5bbb93deb007"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a55e8a3596048c2f7b574049aeb1885b5abba1cc",
          "url": "https://git.kernel.org/stable/c/a55e8a3596048c2f7b574049aeb1885b5abba1cc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb14a93bccc92766b1d9302c6bcbea17d4bce306",
          "url": "https://git.kernel.org/stable/c/bb14a93bccc92766b1d9302c6bcbea17d4bce306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e84829522fc72bb43556b31575731de0440ac0dd",
          "url": "https://git.kernel.org/stable/c/e84829522fc72bb43556b31575731de0440ac0dd"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50497",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinfmt_misc: fix shift-out-of-bounds in check_special_flags\n\nUBSAN reported a shift-out-of-bounds warning:\n\n left shift of 1 by 31 places cannot be represented in type 'int'\n Call Trace:\n  <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x8d/0xcf lib/dump_stack.c:106\n  ubsan_epilogue+0xa/0x44 lib/ubsan.c:151\n  __ubsan_handle_shift_out_of_bounds+0x1e7/0x208 lib/ubsan.c:322\n  check_special_flags fs/binfmt_misc.c:241 [inline]\n  create_entry fs/binfmt_misc.c:456 [inline]\n  bm_register_write+0x9d3/0xa20 fs/binfmt_misc.c:654\n  vfs_write+0x11e/0x580 fs/read_write.c:582\n  ksys_write+0xcf/0x120 fs/read_write.c:637\n  do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n  do_syscall_64+0x34/0x80 arch/x86/entry/common.c:80\n  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n RIP: 0033:0x4194e1\n\nSince the type of Node's flags is unsigned long, we should define these\nmacros with same type too.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50497"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f1a48994b3e516d5c7fd5d12204fdba7a604771",
          "url": "https://git.kernel.org/stable/c/0f1a48994b3e516d5c7fd5d12204fdba7a604771"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/419b808504c26b3e3342365f34ccd0843e09a7f8",
          "url": "https://git.kernel.org/stable/c/419b808504c26b3e3342365f34ccd0843e09a7f8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6a46bf558803dd2b959ca7435a5c143efe837217",
          "url": "https://git.kernel.org/stable/c/6a46bf558803dd2b959ca7435a5c143efe837217"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/88cea1676a09f7c45a1438153a126610c33b1590",
          "url": "https://git.kernel.org/stable/c/88cea1676a09f7c45a1438153a126610c33b1590"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97382a2639b1cd9631f6069061e9d7062cd2b098",
          "url": "https://git.kernel.org/stable/c/97382a2639b1cd9631f6069061e9d7062cd2b098"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a651bb5ff997b9f02662bcdef3d8b4e6f0d79656",
          "url": "https://git.kernel.org/stable/c/a651bb5ff997b9f02662bcdef3d8b4e6f0d79656"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a91123d4bda463469f68f0427adabf8108001f94",
          "url": "https://git.kernel.org/stable/c/a91123d4bda463469f68f0427adabf8108001f94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dcbc51d31d0afbd45e830e3cf565a7b3ca7bf0d8",
          "url": "https://git.kernel.org/stable/c/dcbc51d31d0afbd45e830e3cf565a7b3ca7bf0d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea6145370be8016755c43aca799815fc4b8c88b1",
          "url": "https://git.kernel.org/stable/c/ea6145370be8016755c43aca799815fc4b8c88b1"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39955",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().\n\nsyzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk\nin the TCP_ESTABLISHED state. [0]\n\nsyzbot reused the server-side TCP Fast Open socket as a new client before\nthe TFO socket completes 3WHS:\n\n  1. accept()\n  2. connect(AF_UNSPEC)\n  3. connect() to another destination\n\nAs of accept(), sk->sk_state is TCP_SYN_RECV, and tcp_disconnect() changes\nit to TCP_CLOSE and makes connect() possible, which restarts timers.\n\nSince tcp_disconnect() forgot to clear tcp_sk(sk)->fastopen_rsk, the\nretransmit timer triggered the warning and the intended packet was not\nretransmitted.\n\nLet's call reqsk_fastopen_remove() in tcp_disconnect().\n\n[0]:\nWARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))\nModules linked in:\nCPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nRIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))\nCode: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 <0f> 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e\nRSP: 0018:ffffc900002f8d40 EFLAGS: 00010293\nRAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017\nRDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400\nRBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8\nR10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540\nR13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0\nFS:  0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0\nCall Trace:\n <IRQ>\n tcp_write_timer (net/ipv4/tcp_timer.c:738)\n call_timer_fn (kernel/time/timer.c:1747)\n __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372)\n timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135)\n tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035)\n __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1))\n tmigr_handle_remote (kernel/time/timer_migration.c:1096)\n handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580)\n irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35))\n </IRQ>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39955"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17d699727577814198d744d6afe54735c6b54c99",
          "url": "https://git.kernel.org/stable/c/17d699727577814198d744d6afe54735c6b54c99"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/33a4fdf0b4a25f8ce65380c3b0136b407ca57609",
          "url": "https://git.kernel.org/stable/c/33a4fdf0b4a25f8ce65380c3b0136b407ca57609"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/45c8a6cc2bcd780e634a6ba8e46bffbdf1fc5c01",
          "url": "https://git.kernel.org/stable/c/45c8a6cc2bcd780e634a6ba8e46bffbdf1fc5c01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ec092a91ff351dcde89c23e795b73a328274db6",
          "url": "https://git.kernel.org/stable/c/7ec092a91ff351dcde89c23e795b73a328274db6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a4378dedd6e07e62f2fccb17d78c9665718763d0",
          "url": "https://git.kernel.org/stable/c/a4378dedd6e07e62f2fccb17d78c9665718763d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae313d14b45eca7a6bb29cb9bf396d977e7d28fb",
          "url": "https://git.kernel.org/stable/c/ae313d14b45eca7a6bb29cb9bf396d977e7d28fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dfd06131107e7b699ef1e2a24ed2f7d17c917753",
          "url": "https://git.kernel.org/stable/c/dfd06131107e7b699ef1e2a24ed2f7d17c917753"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fa4749c065644af4db496b338452a69a3e5147d9",
          "url": "https://git.kernel.org/stable/c/fa4749c065644af4db496b338452a69a3e5147d9"
        }
      ],
      "release_date": "2025-10-09T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53676",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it's possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53676"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50",
          "url": "https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc",
          "url": "https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6",
          "url": "https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d",
          "url": "https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2",
          "url": "https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4",
          "url": "https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a",
          "url": "https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083",
          "url": "https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37749",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ppp: Add bound checking for skb data on ppp_sync_txmung\n\nEnsure we have enough data in linear buffer from skb before accessing\ninitial bytes. This prevents potential out-of-bounds accesses\nwhen processing short packets.\n\nWhen ppp_sync_txmung receives an incoming package with an empty\npayload:\n(remote) gef➤  p *(struct pppoe_hdr *) (skb->head + skb->network_header)\n$18 = {\n\ttype = 0x1,\n\tver = 0x1,\n\tcode = 0x0,\n\tsid = 0x2,\n        length = 0x0,\n\ttag = 0xffff8880371cdb96\n}\n\nfrom the skb struct (trimmed)\n      tail = 0x16,\n      end = 0x140,\n      head = 0xffff88803346f400 \"4\",\n      data = 0xffff88803346f416 \":\\377\",\n      truesize = 0x380,\n      len = 0x0,\n      data_len = 0x0,\n      mac_len = 0xe,\n      hdr_len = 0x0,\n\nit is not safe to access data[2].\n\n[pabeni@redhat.com: fixed subj typo]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37749"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f6eb9fa87a781d5370c0de7794ae242f1a95ee5",
          "url": "https://git.kernel.org/stable/c/1f6eb9fa87a781d5370c0de7794ae242f1a95ee5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/529401c8f12ecc35f9ea5d946d5a5596cf172b48",
          "url": "https://git.kernel.org/stable/c/529401c8f12ecc35f9ea5d946d5a5596cf172b48"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e8a6bf43cea4347121ab21bb1ed8d7bef7e732e",
          "url": "https://git.kernel.org/stable/c/6e8a6bf43cea4347121ab21bb1ed8d7bef7e732e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99aa698dec342a07125d733e39aab4394b3b7e05",
          "url": "https://git.kernel.org/stable/c/99aa698dec342a07125d733e39aab4394b3b7e05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aabc6596ffb377c4c9c8f335124b92ea282c9821",
          "url": "https://git.kernel.org/stable/c/aabc6596ffb377c4c9c8f335124b92ea282c9821"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4c836d33ca888695b2f2665f948bc1b34fbd533",
          "url": "https://git.kernel.org/stable/c/b4c836d33ca888695b2f2665f948bc1b34fbd533"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b78f2b458f56a5a4d976c8e01c43dbf58d3ea2ca",
          "url": "https://git.kernel.org/stable/c/b78f2b458f56a5a4d976c8e01c43dbf58d3ea2ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de5a4f0cba58625e88b7bebd88f780c8c0150997",
          "url": "https://git.kernel.org/stable/c/de5a4f0cba58625e88b7bebd88f780c8c0150997"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fbaffe8bccf148ece8ad67eb5d7aa852cabf59c8",
          "url": "https://git.kernel.org/stable/c/fbaffe8bccf148ece8ad67eb5d7aa852cabf59c8"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53111",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Fix use-after-free issues\n\ndo_req_filebacked() calls blk_mq_complete_request() synchronously or\nasynchronously when using asynchronous I/O unless memory allocation fails.\nHence, modify loop_handle_cmd() such that it does not dereference 'cmd' nor\n'rq' after do_req_filebacked() finished unless we are sure that the request\nhas not yet been completed. This patch fixes the following kernel crash:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000054\nCall trace:\n css_put.42938+0x1c/0x1ac\n loop_process_work+0xc8c/0xfd4\n loop_rootcg_workfn+0x24/0x34\n process_one_work+0x244/0x558\n worker_thread+0x400/0x8fc\n kthread+0x16c/0x1e0\n ret_from_fork+0x10/0x20",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53111"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/407badf73ec9fb0d5744bf2ca1745c1818aa222f",
          "url": "https://git.kernel.org/stable/c/407badf73ec9fb0d5744bf2ca1745c1818aa222f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6917395c4667cfb607ed8bf1826205a59414657c",
          "url": "https://git.kernel.org/stable/c/6917395c4667cfb607ed8bf1826205a59414657c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9b0cb770f5d7b1ff40bea7ca385438ee94570eec",
          "url": "https://git.kernel.org/stable/c/9b0cb770f5d7b1ff40bea7ca385438ee94570eec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e3fda704903f6d1fc351412f1bc6620333959ada",
          "url": "https://git.kernel.org/stable/c/e3fda704903f6d1fc351412f1bc6620333959ada"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38403",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/vmci: Clear the vmci transport packet properly when initializing it\n\nIn vmci_transport_packet_init memset the vmci_transport_packet before\npopulating the fields to avoid any uninitialised data being left in the\nstructure.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38403"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1",
          "url": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d",
          "url": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0",
          "url": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5",
          "url": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e",
          "url": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a",
          "url": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839",
          "url": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce",
          "url": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38157",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Abort software beacon handling if disabled\n\nA malicious USB device can send a WMI_SWBA_EVENTID event from an\nath9k_htc-managed device before beaconing has been enabled. This causes\na device-by-zero error in the driver, leading to either a crash or an\nout of bounds read.\n\nPrevent this by aborting the handling in ath9k_htc_swba() if beacons are\nnot enabled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc",
          "url": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0",
          "url": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e",
          "url": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46",
          "url": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605",
          "url": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c",
          "url": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54",
          "url": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a",
          "url": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38323",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: add lec_mutex\n\nsyzbot found its way in net/atm/lec.c, and found an error path\nin lecd_attach() could leave a dangling pointer in dev_lec[].\n\nAdd a mutex to protect dev_lecp[] uses from lecd_attach(),\nlec_vcc_attach() and lec_mcast_attach().\n\nFollowing patch will use this mutex for /proc/net/atm/lec.\n\nBUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]\nBUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\nRead of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142\n\nCPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:94 [inline]\n  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n  print_address_description mm/kasan/report.c:408 [inline]\n  print_report+0xcd/0x680 mm/kasan/report.c:521\n  kasan_report+0xe0/0x110 mm/kasan/report.c:634\n  lecd_attach net/atm/lec.c:751 [inline]\n  lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n </TASK>\n\nAllocated by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n  kasan_kmalloc include/linux/kasan.h:260 [inline]\n  __do_kmalloc_node mm/slub.c:4328 [inline]\n  __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015\n  alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711\n  lecd_attach net/atm/lec.c:737 [inline]\n  lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576\n  poison_slab_object mm/kasan/common.c:247 [inline]\n  __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264\n  kasan_slab_free include/linux/kasan.h:233 [inline]\n  slab_free_hook mm/slub.c:2381 [inline]\n  slab_free mm/slub.c:4643 [inline]\n  kfree+0x2b4/0x4d0 mm/slub.c:4842\n  free_netdev+0x6c5/0x910 net/core/dev.c:11892\n  lecd_attach net/atm/lec.c:744 [inline]\n  lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38323"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8",
          "url": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a",
          "url": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424",
          "url": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192",
          "url": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67",
          "url": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8",
          "url": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b",
          "url": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e",
          "url": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-42120",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check pipe offset before setting vblank\n\npipe_ctx has a size of MAX_PIPES so checking its index before accessing\nthe array.\n\nThis fixes an OVERRUN issue reported by Coverity.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-42120"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0b3702f9d43d163fd05e43b7d7e22e766dbef329",
          "url": "https://git.kernel.org/stable/c/0b3702f9d43d163fd05e43b7d7e22e766dbef329"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5396a70e8cf462ec5ccf2dc8de103c79de9489e6",
          "url": "https://git.kernel.org/stable/c/5396a70e8cf462ec5ccf2dc8de103c79de9489e6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/96bf81cc1bd058bb8af6e755a548e926e934dfd1",
          "url": "https://git.kernel.org/stable/c/96bf81cc1bd058bb8af6e755a548e926e934dfd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2e9abc95583ac7bbb2c47da4d476a798146dfd6",
          "url": "https://git.kernel.org/stable/c/b2e9abc95583ac7bbb2c47da4d476a798146dfd6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5ec2afeeee4c91cebc4eff6d4f1ecf4047259f4",
          "url": "https://git.kernel.org/stable/c/c5ec2afeeee4c91cebc4eff6d4f1ecf4047259f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d2c3645a4a5ae5d933b4116c305d9d82b8199dbf",
          "url": "https://git.kernel.org/stable/c/d2c3645a4a5ae5d933b4116c305d9d82b8199dbf"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-07-30T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53039",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: intel-ish-hid: ipc: Fix potential use-after-free in work function\n\nWhen a reset notify IPC message is received, the ISR schedules a work\nfunction and passes the ISHTP device to it via a global pointer\nishtp_dev. If ish_probe() fails, the devm-managed device resources\nincluding ishtp_dev are freed, but the work is not cancelled, causing a\nuse-after-free when the work function tries to access ishtp_dev. Use\ndevm_work_autocancel() instead, so that the work is automatically\ncancelled if probe fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53039"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a594cb490ca6232671fc09e2dc1a0fc7ccbb0b5",
          "url": "https://git.kernel.org/stable/c/0a594cb490ca6232671fc09e2dc1a0fc7ccbb0b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ae2f2b0a28416ed2f6d8478ac8b9f7862f36785",
          "url": "https://git.kernel.org/stable/c/8ae2f2b0a28416ed2f6d8478ac8b9f7862f36785"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8c1d378b8c224fd50247625255f09fc01dcc5836",
          "url": "https://git.kernel.org/stable/c/8c1d378b8c224fd50247625255f09fc01dcc5836"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3ce3afd9f791dd1b7daedfcf8c396b60af5dec0",
          "url": "https://git.kernel.org/stable/c/d3ce3afd9f791dd1b7daedfcf8c396b60af5dec0"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38180",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: fix /proc/net/atm/lec handling\n\n/proc/net/atm/lec must ensure safety against dev_lec[] changes.\n\nIt appears it had dev_put() calls without prior dev_hold(),\nleading to imbalance and UAF.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38180"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc",
          "url": "https://git.kernel.org/stable/c/5fe1b23a2f87f43aeeac51e08819cbc6fd808cbc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9b9aeb3ada44d8abea1e31e4446113f460848ae4",
          "url": "https://git.kernel.org/stable/c/9b9aeb3ada44d8abea1e31e4446113f460848ae4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a5e3a144268899f1a8c445c8a3bfa15873ba85e8",
          "url": "https://git.kernel.org/stable/c/a5e3a144268899f1a8c445c8a3bfa15873ba85e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ca3829c18c8d0ceb656605d3bff6bb3dfb078589",
          "url": "https://git.kernel.org/stable/c/ca3829c18c8d0ceb656605d3bff6bb3dfb078589"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d03b79f459c7935cff830d98373474f440bd03ae",
          "url": "https://git.kernel.org/stable/c/d03b79f459c7935cff830d98373474f440bd03ae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8",
          "url": "https://git.kernel.org/stable/c/e612c4b014f5808fbc6beae21f5ccaca5e76a2f8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7",
          "url": "https://git.kernel.org/stable/c/f2d1443b18806640abdb530e88009af7be2588e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fcfccf56f4eba7d00aa2d33c7bb1b33083237742",
          "url": "https://git.kernel.org/stable/c/fcfccf56f4eba7d00aa2d33c7bb1b33083237742"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-54102",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow\nA static code analysis tool flagged the possibility of buffer overflow when\nusing copy_from_user() for a debugfs entry.\nCurrently, it is possible that copy_from_user() copies more bytes than what\nwould fit in the mybuf char array.  Add a min() restriction check between\nsizeof(mybuf) - 1 and nbytes passed from the userspace buffer to protect\nagainst buffer overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-54102"
        }
      ],
      "release_date": "2025-12-24T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-40322",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nfbdev: bitblit: bound-check glyph index in bit_putcs*\nbit_putcs_aligned()/unaligned() derived the glyph pointer from the\ncharacter value masked by 0xff/0x1ff, which may exceed the actual font's\nglyph count and read past the end of the built-in font array.\nClamp the index to the actual glyph count before computing the address.\nThis fixes a global out-of-bounds read reported by syzbot.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
          "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-40322"
        }
      ],
      "release_date": "2025-12-08T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-14T14:02:11.142685Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729",
          "product_ids": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771077729"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-8.5:bpftool-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-cross-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-core-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-debug-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-headers-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-ipaclones-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-extra-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-modules-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-selftests-internal-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:kernel-tools-libs-devel-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64",
            "CentOS-8.5:python3-perf-0:4.18.0-348.7.1.el8_5.tuxcare.els34.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}