{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623}\n- net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074}\n- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089}\n- atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). {CVE-2025-39828}\n- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class\n- wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() {CVE-2025-38348}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/oraclelinux6els/advisories/2026/clsa-2026_1775745222.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-09T14:34:45Z",
      "generator": {
        "date": "2026-04-09T14:34:45Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1775745222",
      "initial_release_date": "2026-04-09T14:34:45Z",
      "revision_history": [
        {
          "date": "2026-04-09T14:34:45Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "kernel: Fix of 5 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 6",
                "product": {
                  "name": "Oracle Linux 6",
                  "product_id": "Oracle-Linux-6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Oracle Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                "product": {
                  "name": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                  "product_id": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-abi-whitelists@2.6.32-754.35.8.el6.tuxcare.els31?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                  "product_id": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-doc@2.6.32-754.35.8.el6.tuxcare.els31?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                "product": {
                  "name": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                  "product_id": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-firmware@2.6.32-754.35.8.el6.tuxcare.els31?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_id": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-headers@2.6.32-754.35.8.el6.tuxcare.els31?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_id": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug@2.6.32-754.35.8.el6.tuxcare.els31?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_id": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-devel@2.6.32-754.35.8.el6.tuxcare.els31?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                "product": {
                  "name": "perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_id": "perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/perf@2.6.32-754.35.8.el6.tuxcare.els31?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                "product": {
                  "name": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_id": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel@2.6.32-754.35.8.el6.tuxcare.els31?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                "product": {
                  "name": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_id": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/python-perf@2.6.32-754.35.8.el6.tuxcare.els31?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-devel@2.6.32-754.35.8.el6.tuxcare.els31?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
                  "product_id": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/kernel-debug-devel@2.6.32-754.35.8.el6.tuxcare.els31?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch"
        },
        "product_reference": "kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        },
        "product_reference": "perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        },
        "product_reference": "kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        },
        "product_reference": "python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch"
        },
        "product_reference": "kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
        "relates_to_product_reference": "Oracle-Linux-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64 as a component of Oracle Linux 6",
          "product_id": "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
        "relates_to_product_reference": "Oracle-Linux-6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-38348",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()\n\nRobert Morris reported:\n\n|If a malicious USB device pretends to be an Intersil p54 wifi\n|interface and generates an eeprom_readback message with a large\n|eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the\n|message beyond the end of priv->eeprom.\n|\n|static void p54_rx_eeprom_readback(struct p54_common *priv,\n|                                   struct sk_buff *skb)\n|{\n|        struct p54_hdr *hdr = (struct p54_hdr *) skb->data;\n|        struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr->data;\n|\n|        if (priv->fw_var >= 0x509) {\n|                memcpy(priv->eeprom, eeprom->v2.data,\n|                       le16_to_cpu(eeprom->v2.len));\n|        } else {\n|                memcpy(priv->eeprom, eeprom->v1.data,\n|                       le16_to_cpu(eeprom->v1.len));\n|        }\n| [...]\n\nThe eeprom->v{1,2}.len is set by the driver in p54_download_eeprom().\nThe device is supposed to provide the same length back to the driver.\nBut yes, it's possible (like shown in the report) to alter the value\nto something that causes a crash/panic due to overrun.\n\nThis patch addresses the issue by adding the size to the common device\ncontext, so p54_rx_eeprom_readback no longer relies on possibly tampered\nvalues... That said, it also checks if the \"firmware\" altered the value\nand no longer copies them.\n\nThe one, small saving grace is: Before the driver tries to read the eeprom,\nit needs to upload >a< firmware. the vendor firmware has a proprietary\nlicense and as a reason, it is not present on most distributions by\ndefault.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38348"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036",
          "url": "https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422",
          "url": "https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57",
          "url": "https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb",
          "url": "https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94",
          "url": "https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d",
          "url": "https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99",
          "url": "https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802",
          "url": "https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T14:33:44.389882Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222",
          "product_ids": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23089",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer->id_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n  get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n  get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n  mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n  snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n  ...\n  snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n  usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23089"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/51b1aa6fe7dc87356ba58df06afb9677c9b841ea",
          "url": "https://git.kernel.org/stable/c/51b1aa6fe7dc87356ba58df06afb9677c9b841ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56fb6efd5d04caf6f14994d51ec85393b9a896c6",
          "url": "https://git.kernel.org/stable/c/56fb6efd5d04caf6f14994d51ec85393b9a896c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7009daeefa945973a530b2f605fe445fc03747af",
          "url": "https://git.kernel.org/stable/c/7009daeefa945973a530b2f605fe445fc03747af"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7bff0156d13f0ad9436e5178b979b063d59f572a",
          "url": "https://git.kernel.org/stable/c/7bff0156d13f0ad9436e5178b979b063d59f572a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/930e69757b74c3ae083b0c3c7419bfe7f0edc7b2",
          "url": "https://git.kernel.org/stable/c/930e69757b74c3ae083b0c3c7419bfe7f0edc7b2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dc1a5dd80af1ee1f29d8375b12dd7625f6294dad",
          "url": "https://git.kernel.org/stable/c/dc1a5dd80af1ee1f29d8375b12dd7625f6294dad"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6f103a22b08daf5df2f4aa158081840e5910963",
          "url": "https://git.kernel.org/stable/c/e6f103a22b08daf5df2f4aa158081840e5910963"
        }
      ],
      "release_date": "2026-02-04T17:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T14:33:44.389882Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222",
          "product_ids": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23074",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim <km.kim1503@gmail.com> managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n  ├── class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n  └── class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql's enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch->q.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql's\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2's lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc's\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem's delay), a dangling pointer is\naccessed causing GangMin's causing a UAF.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23074"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0686bedfed34155520f3f735cbf3210cb9044380",
          "url": "https://git.kernel.org/stable/c/0686bedfed34155520f3f735cbf3210cb9044380"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16ed73c1282d376b956bff23e5139add061767ba",
          "url": "https://git.kernel.org/stable/c/16ed73c1282d376b956bff23e5139add061767ba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4c7e8aa71c9232cba84c289b4b56cba80b280841",
          "url": "https://git.kernel.org/stable/c/4c7e8aa71c9232cba84c289b4b56cba80b280841"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b",
          "url": "https://git.kernel.org/stable/c/50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73d970ff0eddd874a84c953387c7f4464b705fc6",
          "url": "https://git.kernel.org/stable/c/73d970ff0eddd874a84c953387c7f4464b705fc6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae810e6a8ac4fe25042e6825d2a401207a2e41fb",
          "url": "https://git.kernel.org/stable/c/ae810e6a8ac4fe25042e6825d2a401207a2e41fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dad49a67c2d817bfec98e6e45121b351e3a0202c",
          "url": "https://git.kernel.org/stable/c/dad49a67c2d817bfec98e6e45121b351e3a0202c"
        }
      ],
      "release_date": "2026-02-04T17:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T14:33:44.389882Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222",
          "product_ids": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39828",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: atmtcp: Prevent arbitrary write in atmtcp_recv_control().\n\nsyzbot reported the splat below. [0]\n\nWhen atmtcp_v_open() or atmtcp_v_close() is called via connect()\nor close(), atmtcp_send_control() is called to send an in-kernel\nspecial message.\n\nThe message has ATMTCP_HDR_MAGIC in atmtcp_control.hdr.length.\nAlso, a pointer of struct atm_vcc is set to atmtcp_control.vcc.\n\nThe notable thing is struct atmtcp_control is uAPI but has a\nspace for an in-kernel pointer.\n\n  struct atmtcp_control {\n  \tstruct atmtcp_hdr hdr;\t/* must be first */\n  ...\n  \tatm_kptr_t vcc;\t\t/* both directions */\n  ...\n  } __ATM_API_ALIGN;\n\n  typedef struct { unsigned char _[8]; } __ATM_API_ALIGN atm_kptr_t;\n\nThe special message is processed in atmtcp_recv_control() called\nfrom atmtcp_c_send().\n\natmtcp_c_send() is vcc->dev->ops->send() and called from 2 paths:\n\n  1. .ndo_start_xmit() (vcc->send() == atm_send_aal0())\n  2. vcc_sendmsg()\n\nThe problem is sendmsg() does not validate the message length and\nuserspace can abuse atmtcp_recv_control() to overwrite any kptr\nby atmtcp_control.\n\nLet's add a new ->pre_send() hook to validate messages from sendmsg().\n\n[0]:\nOops: general protection fault, probably for non-canonical address 0xdffffc00200000ab: 0000 [#1] SMP KASAN PTI\nKASAN: probably user-memory-access in range [0x0000000100000558-0x000000010000055f]\nCPU: 0 UID: 0 PID: 5865 Comm: syz-executor331 Not tainted 6.17.0-rc1-syzkaller-00215-gbab3ce404553 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:atmtcp_recv_control drivers/atm/atmtcp.c:93 [inline]\nRIP: 0010:atmtcp_c_send+0x1da/0x950 drivers/atm/atmtcp.c:297\nCode: 4d 8d 75 1a 4c 89 f0 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 15 06 00 00 41 0f b7 1e 4d 8d b7 60 05 00 00 4c 89 f0 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 13 06 00 00 66 41 89 1e 4d 8d 75 1c 4c\nRSP: 0018:ffffc90003f5f810 EFLAGS: 00010203\nRAX: 00000000200000ab RBX: 0000000000000000 RCX: 0000000000000000\nRDX: ffff88802a510000 RSI: 00000000ffffffff RDI: ffff888030a6068c\nRBP: ffff88802699fb40 R08: ffff888030a606eb R09: 1ffff1100614c0dd\nR10: dffffc0000000000 R11: ffffffff8718fc40 R12: dffffc0000000000\nR13: ffff888030a60680 R14: 000000010000055f R15: 00000000ffffffff\nFS:  00007f8d7e9236c0(0000) GS:ffff888125c1c000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000000045ad50 CR3: 0000000075bde000 CR4: 00000000003526f0\nCall Trace:\n <TASK>\n vcc_sendmsg+0xa10/0xc60 net/atm/common.c:645\n sock_sendmsg_nosec net/socket.c:714 [inline]\n __sock_sendmsg+0x219/0x270 net/socket.c:729\n ____sys_sendmsg+0x505/0x830 net/socket.c:2614\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668\n __sys_sendmsg net/socket.c:2700 [inline]\n __do_sys_sendmsg net/socket.c:2705 [inline]\n __se_sys_sendmsg net/socket.c:2703 [inline]\n __x64_sys_sendmsg+0x19b/0x260 net/socket.c:2703\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f8d7e96a4a9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f8d7e923198 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f8d7e9f4308 RCX: 00007f8d7e96a4a9\nRDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005\nRBP: 00007f8d7e9f4300 R08: 65732f636f72702f R09: 65732f636f72702f\nR10: 65732f636f72702f R11: 0000000000000246 R12: 00007f8d7e9c10ac\nR13: 00007f8d7e9231a0 R14: 0000200000000200 R15: 0000200000000250\n </TASK>\nModules linked in:",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
          "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
          "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
          "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39828"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a6a6d4fb333f7afe22e59ffed18511a7a98efc8",
          "url": "https://git.kernel.org/stable/c/0a6a6d4fb333f7afe22e59ffed18511a7a98efc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/33f9e6dc66b32202b95fc861e6b3ea4b0c185b0b",
          "url": "https://git.kernel.org/stable/c/33f9e6dc66b32202b95fc861e6b3ea4b0c185b0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ab9f5ad9baefe6d3d4c37053cdfca2761001dfe",
          "url": "https://git.kernel.org/stable/c/3ab9f5ad9baefe6d3d4c37053cdfca2761001dfe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c80c230d6e3e6f63d43f4c3f0bb344e3e8b119b",
          "url": "https://git.kernel.org/stable/c/3c80c230d6e3e6f63d43f4c3f0bb344e3e8b119b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/51872b26429077be611b0a1816e0e722278015c3",
          "url": "https://git.kernel.org/stable/c/51872b26429077be611b0a1816e0e722278015c3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/62f368472b0aa4b5d91d9b983152855c6b6d8925",
          "url": "https://git.kernel.org/stable/c/62f368472b0aa4b5d91d9b983152855c6b6d8925"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b502f16bad8f0a4cfbd023452766f21bfda39dde",
          "url": "https://git.kernel.org/stable/c/b502f16bad8f0a4cfbd023452766f21bfda39dde"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ec79003c5f9d2c7f9576fc69b8dbda80305cbe3a",
          "url": "https://git.kernel.org/stable/c/ec79003c5f9d2c7f9576fc69b8dbda80305cbe3a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-16T13:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T14:33:44.389882Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222",
          "product_ids": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775745222"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-6:kernel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-abi-whitelists-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-debug-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.i686",
            "Oracle-Linux-6:kernel-debug-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-devel-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:kernel-doc-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-firmware-0:2.6.32-754.35.8.el6.tuxcare.els31.noarch",
            "Oracle-Linux-6:kernel-headers-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64",
            "Oracle-Linux-6:python-perf-0:2.6.32-754.35.8.el6.tuxcare.els31.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}