{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "x86/kvm: Disable kvmclock on all CPUs on shutdown {CVE-2021-47110}\n- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() {CVE-2025-38352}\n- cifs: fix double free race when mount fails in cifs_get_root() {CVE-2022-48919}\n- aio: mark AIO pseudo-fs noexec {CVE-2016-10044}\n- cifs: potential buffer overflow in handling symlinks {CVE-2022-49058}\n- NFSD: fix race between nfsd registration and exports_proc {CVE-2025-38232}\n- nfsd: register pernet ops last, unregister first {CVE-2025-38232}\n- net: atm: fix use after free in lec_send() {CVE-2025-22004}\n- net: atlantic: fix aq_vec index out of range error {CVE-2022-50066}\n- do_change_type(): refuse to operate on unmounted/not ours mounts {CVE-2025-38498}\n- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}\n- net: atm: add lec_mutex {CVE-2025-38180}\n- SUNRPC: make sure cache entry active before cache_show {CVE-2024-53174}\n- scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() {CVE-2025-38399}\n- scsi: target: Fix crash during SPEC_I_PT handling {CVE-2025-38399}\n- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race {CVE-2025-38085}\n- drivers:md:fix a potential use-after-free bug {CVE-2022-50022}\n- ext4: avoid resizing to a partial cluster size {CVE-2022-50020}\n- HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() {CVE-2025-21928}\n- net/sched: Abort __tc_modify_qdisc if parent class does not exist {CVE-2025-38457}\n- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() {CVE-2022-49788}\n- dlm: fix plock invalid read {CVE-2022-49407}\n- net: usb: smsc75xx: Limit packet length to skb->len {CVE-2023-53125}\n- scsi: libfc: Fix use after free in fc_exch_abts_resp() {CVE-2022-49114}\n- crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}\n- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}\n- HID: core: ensure the allocated report buffer can contain the reserved report ID {CVE-2025-38495}\n- ext4: Fix possible corruption when moving a directory {CVE-2023-53137}\n- ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770}\n- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}\n- HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494}\n- sch_hfsc: make hfsc_qlen_notify() idempotent {CVE-2025-38177}\n- ext4: check dot and dotdot of dx_root before making dir indexed {CVE-2024-42305}\n- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229}\n- dm ioctl: prevent potential spectre v1 gadget {CVE-2022-49122}\n- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}\n- md-raid10: fix KASAN warning {CVE-2022-50211}\n- scsi: lpfc: Use memcpy() for BIOS version {CVE-2025-38332}\n- ACPICA: Refuse to evaluate a method if arguments are missing {CVE-2025-38386}\n- media: cxusb: no longer judge rbuf when the write fails {CVE-2025-38229}\n- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}\n- ext4: fix off-by-one error in do_split {CVE-2025-23150}\n- perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init {CVE-2025-37878}\n- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() {CVE-2025-38000}\n- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/oraclelinux7els/advisories/2025/clsa-2025_1757698145.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1757698145",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1757698145"
      }
    ],
    "tracking": {
      "current_release_date": "2025-09-12T17:33:39Z",
      "generator": {
        "date": "2025-09-12T17:33:39Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1757698145",
      "initial_release_date": "2025-09-12T17:33:39Z",
      "revision_history": [
        {
          "date": "2025-09-12T17:33:39Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "kernel: Fix of 42 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 7",
                "product": {
                  "name": "Oracle Linux 7",
                  "product_id": "Oracle-Linux-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Oracle Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python-perf@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@3.10.0-1160.119.1.0.5.el7.tuxcare.els24?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-22004",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet: atm: fix use after free in lec_send()\nThe ->send() operation frees skb so save the length before calling\n->send() to avoid a use after free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-22004"
        }
      ],
      "release_date": "2025-04-03T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-23150",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\next4: fix off-by-one error in do_split\nSyzkaller detected a use-after-free issue in ext4_insert_dentry that was\ncaused by out-of-bounds access due to incorrect splitting in do_split.\nBUG: KASAN: use-after-free in ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109\nWrite of size 251 at addr ffff888074572f14 by task syz-executor335/5847\nCPU: 0 UID: 0 PID: 5847 Comm: syz-executor335 Not tainted 6.12.0-rc6-syzkaller-00318-ga9cda7c0ffed #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024\nCall Trace:\n<TASK>\n__dump_stack lib/dump_stack.c:94 [inline]\ndump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\nprint_address_description mm/kasan/report.c:377 [inline]\nprint_report+0x169/0x550 mm/kasan/report.c:488\nkasan_report+0x143/0x180 mm/kasan/report.c:601\nkasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n__asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\next4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109\nadd_dirent_to_buf+0x3d9/0x750 fs/ext4/namei.c:2154\nmake_indexed_dir+0xf98/0x1600 fs/ext4/namei.c:2351\next4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2455\next4_add_nondir+0x8d/0x290 fs/ext4/namei.c:2796\next4_symlink+0x920/0xb50 fs/ext4/namei.c:3431\nvfs_symlink+0x137/0x2e0 fs/namei.c:4615\ndo_symlinkat+0x222/0x3a0 fs/namei.c:4641\n__do_sys_symlink fs/namei.c:4662 [inline]\n__se_sys_symlink fs/namei.c:4660 [inline]\n__x64_sys_symlink+0x7a/0x90 fs/namei.c:4660\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x77/0x7f\n</TASK>\nThe following loop is located right above 'if' statement.\nfor (i = count-1; i >= 0; i--) {\n/* is more than half of this entry in 2nd half of the block? */\nif (size + map[i].size/2 > blocksize/2)\nbreak;\nsize += map[i].size;\nmove++;\n}\n'i' in this case could go down to -1, in which case sum of active entries\nwouldn't exceed half the block size, but previous behaviour would also do\nsplit in half if sum would exceed at the very last block, which in case of\nhaving too many long name files in a single block could lead to\nout-of-bounds access and following use-after-free.\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-23150"
        }
      ],
      "release_date": "2025-05-01T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-50022",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndrivers:md:fix a potential use-after-free bug\nIn line 2884, \"raid5_release_stripe(sh);\" drops the reference to sh and\nmay cause sh to be released. However, sh is subsequently used in lines\n2886 \"if (sh->batch_head && sh != sh->batch_head)\". This may result in an\nuse-after-free bug.\nIt can be fixed by moving \"raid5_release_stripe(sh);\" to the bottom of\nthe function.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50022"
        }
      ],
      "release_date": "2025-06-18T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-50020",
      "cwe": {
        "id": "CWE-1284",
        "name": "Improper Validation of Specified Quantity in Input"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\next4: avoid resizing to a partial cluster size\nThis patch avoids an attempt to resize the filesystem to an\nunaligned cluster boundary.  An online resize to a size that is not\nintegral to cluster size results in the last iteration attempting to\ngrow the fs by a negative amount, which trips a BUG_ON and leaves the fs\nwith a corrupted in-memory superblock.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50020"
        }
      ],
      "release_date": "2025-06-18T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-49788",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmisc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()\n`struct vmci_event_qp` allocated by qp_notify_peer() contains padding,\nwhich may carry uninitialized data to the userspace, as observed by\nKMSAN:\nBUG: KMSAN: kernel-infoleak in instrument_copy_to_user ./include/linux/instrumented.h:121\ninstrument_copy_to_user ./include/linux/instrumented.h:121\n_copy_to_user+0x5f/0xb0 lib/usercopy.c:33\ncopy_to_user ./include/linux/uaccess.h:169\nvmci_host_do_receive_datagram drivers/misc/vmw_vmci/vmci_host.c:431\nvmci_host_unlocked_ioctl+0x33d/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:925\nvfs_ioctl fs/ioctl.c:51\n...\nUninit was stored to memory at:\nkmemdup+0x74/0xb0 mm/util.c:131\ndg_dispatch_as_host drivers/misc/vmw_vmci/vmci_datagram.c:271\nvmci_datagram_dispatch+0x4f8/0xfc0 drivers/misc/vmw_vmci/vmci_datagram.c:339\nqp_notify_peer+0x19a/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1479\nqp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662\nqp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750\nvmci_qp_broker_alloc+0x96/0xd0 drivers/misc/vmw_vmci/vmci_queue_pair.c:1940\nvmci_host_do_alloc_queuepair drivers/misc/vmw_vmci/vmci_host.c:488\nvmci_host_unlocked_ioctl+0x24fd/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:927\n...\nLocal variable ev created at:\nqp_notify_peer+0x54/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1456\nqp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662\nqp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750\nBytes 28-31 of 48 are uninitialized\nMemory access of size 48 starts at ffff888035155e00\nData copied to user address 0000000020000100\nUse memset() to prevent the infoleaks.\nAlso speculatively fix qp_notify_peer_local(), which may suffer from the\nsame problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49788"
        }
      ],
      "release_date": "2025-05-01T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38457",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/sched: Abort __tc_modify_qdisc if parent class does not exist\nLion's patch [1] revealed an ancient bug in the qdisc API.\nWhenever a user creates/modifies a qdisc specifying as a parent another\nqdisc, the qdisc API will, during grafting, detect that the user is\nnot trying to attach to a class and reject. However grafting is\nperformed after qdisc_create (and thus the qdiscs' init callback) is\nexecuted. In qdiscs that eventually call qdisc_tree_reduce_backlog\nduring init or change (such as fq, hhf, choke, etc), an issue\narises. For example, executing the following commands:\nsudo tc qdisc add dev lo root handle a: htb default 2\nsudo tc qdisc add dev lo parent a: handle beef fq\nQdiscs such as fq, hhf, choke, etc unconditionally invoke\nqdisc_tree_reduce_backlog() in their control path init() or change() which\nthen causes a failure to find the child class; however, that does not stop\nthe unconditional invocation of the assumed child qdisc's qlen_notify with\na null class. All these qdiscs make the assumption that class is non-null.\nThe solution is ensure that qdisc_leaf() which looks up the parent\nclass, and is invoked prior to qdisc_create(), should return failure on\nnot finding the class.\nIn this patch, we leverage qdisc_leaf to return ERR_PTRs whenever the\nparentid doesn't correspond to a class, so that we can detect it\nearlier on and abort before qdisc_create is called.\n[1] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38457"
        }
      ],
      "release_date": "2025-07-25T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38403",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nvsock/vmci: Clear the vmci transport packet properly when initializing it\nIn vmci_transport_packet_init memset the vmci_transport_packet before\npopulating the fields to avoid any uninitialised data being left in the\nstructure.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38403"
        }
      ],
      "release_date": "2025-07-25T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38399",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()\nThe function core_scsi3_decode_spec_i_port(), in its error code path,\nunconditionally calls core_scsi3_lunacl_undepend_item() passing the\ndest_se_deve pointer, which may be NULL.\nThis can lead to a NULL pointer dereference if dest_se_deve remains\nunset.\nSPC-3 PR SPEC_I_PT: Unable to locate dest_tpg\nUnable to handle kernel paging request at virtual address dfff800000000012\nCall trace:\ncore_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P)\ncore_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod]\ncore_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod]\ntarget_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod]\nFix this by adding a NULL check before calling\ncore_scsi3_lunacl_undepend_item()",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38399"
        }
      ],
      "release_date": "2025-07-25T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38386",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nACPICA: Refuse to evaluate a method if arguments are missing\nAs reported in [1], a platform firmware update that increased the number\nof method parameters and forgot to update a least one of its callers,\ncaused ACPICA to crash due to use-after-free.\nSince this a result of a clear AML issue that arguably cannot be fixed\nup by the interpreter (it cannot produce missing data out of thin air),\naddress it by making ACPICA refuse to evaluate a method if the caller\nattempts to pass fewer arguments than expected to it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38386"
        }
      ],
      "release_date": "2025-07-25T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38229",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmedia: cxusb: no longer judge rbuf when the write fails\nsyzbot reported a uninit-value in cxusb_i2c_xfer. [1]\nOnly when the write operation of usb_bulk_msg() in dvb_usb_generic_rw()\nsucceeds and rlen is greater than 0, the read operation of usb_bulk_msg()\nwill be executed to read rlen bytes of data from the dvb device into the\nrbuf.\nIn this case, although rlen is 1, the write operation failed which resulted\nin the dvb read operation not being executed, and ultimately variable i was\nnot initialized.\n[1]\nBUG: KMSAN: uninit-value in cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\nBUG: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\ncxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]\ncxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196\n__i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1\ni2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315\ni2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343\ni2c_master_send include/linux/i2c.h:109 [inline]\ni2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183\ndo_loop_readv_writev fs/read_write.c:848 [inline]\nvfs_writev+0x963/0x14e0 fs/read_write.c:1057\ndo_writev+0x247/0x5c0 fs/read_write.c:1101\n__do_sys_writev fs/read_write.c:1169 [inline]\n__se_sys_writev fs/read_write.c:1166 [inline]\n__x64_sys_writev+0x98/0xe0 fs/read_write.c:1166\nx64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21\ndo_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\ndo_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94\nentry_SYSCALL_64_after_hwframe+0x77/0x7f",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38229"
        }
      ],
      "release_date": "2025-07-04T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38212",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nipc: fix to protect IPCS lookups using RCU\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\nidr_for_each() is protected by rwsem, but this is not enough.  If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38212"
        }
      ],
      "release_date": "2025-07-04T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38200",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ni40e: fix MMIO write access to an invalid page in i40e_clear_hw\nWhen the device sends a specific input, an integer underflow can occur, leading\nto MMIO write access to an invalid page.\nPrevent the integer underflow by changing the type of related variables.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38200"
        }
      ],
      "release_date": "2025-07-04T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-37823",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don't have a reliable reproducer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37823"
        }
      ],
      "release_date": "2025-05-08T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-53174",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nSUNRPC: make sure cache entry active before cache_show\nThe function `c_show` was called with protection from RCU. This only\nensures that `cp` will not be freed. Therefore, the reference count for\n`cp` can drop to zero, which will trigger a refcount use-after-free\nwarning when `cache_get` is called. To resolve this issue, use\n`cache_get_rcu` to ensure that `cp` remains active.\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 822 at lib/refcount.c:25\nrefcount_warn_saturate+0xb1/0x120\nCPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb1/0x120\nCall Trace:\n<TASK>\nc_show+0x2fc/0x380 [sunrpc]\nseq_read_iter+0x589/0x770\nseq_read+0x1e5/0x270\nproc_reg_read+0xe1/0x140\nvfs_read+0x125/0x530\nksys_read+0xc1/0x160\ndo_syscall_64+0x5f/0x170\nentry_SYSCALL_64_after_hwframe+0x76/0x7e",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-53174"
        }
      ],
      "release_date": "2024-12-27T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-42305",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\next4: check dot and dotdot of dx_root before making dir indexed\nSyzbot reports a issue as follows:\n============================================\nBUG: unable to handle page fault for address: ffffed11022e24fe\nPGD 23ffee067 P4D 23ffee067 PUD 0\nOops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 0 PID: 5079 Comm: syz-executor306 Not tainted 6.10.0-rc5-g55027e689933 #0\nCall Trace:\n<TASK>\nmake_indexed_dir+0xdaf/0x13c0 fs/ext4/namei.c:2341\next4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2451\next4_rename fs/ext4/namei.c:3936 [inline]\next4_rename2+0x26e5/0x4370 fs/ext4/namei.c:4214\n[...]\n============================================\nThe immediate cause of this problem is that there is only one valid dentry\nfor the block to be split during do_split, so split==0 results in out of\nbounds accesses to the map triggering the issue.\ndo_split\nunsigned split\ndx_make_map\ncount = 1\nsplit = count/2 = 0;\ncontinued = hash2 == map[split - 1].hash;\n---> map[4294967295]\nThe maximum length of a filename is 255 and the minimum block size is 1024,\nso it is always guaranteed that the number of entries is greater than or\nequal to 2 when do_split() is called.\nBut syzbot's crafted image has no dot and dotdot in dir, and the dentry\ndistribution in dirblock is as follows:\nbus     dentry1          hole           dentry2           free\n|xx--|xx-------------|...............|xx-------------|...............|\n0   12 (8+248)=256  268     256     524 (8+256)=264 788     236     1024\nSo when renaming dentry1 increases its name_len length by 1, neither hole\nnor free is sufficient to hold the new dentry, and make_indexed_dir() is\ncalled.\nIn make_indexed_dir() it is assumed that the first two entries of the\ndirblock must be dot and dotdot, so bus and dentry1 are left in dx_root\nbecause they are treated as dot and dotdot, and only dentry2 is moved\nto the new leaf block. That's why count is equal to 1.\nTherefore add the ext4_check_dx_root() helper function to add more sanity\nchecks to dot and dotdot before starting the conversion to avoid the above\nissue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-42305"
        }
      ],
      "release_date": "2024-08-17T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2023-53137",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\next4: Fix possible corruption when moving a directory\nWhen we are renaming a directory to a different directory, we need to\nupdate '..' entry in the moved directory. However nothing prevents moved\ndirectory from being modified and even converted from the inline format\nto the normal format. When such race happens the rename code gets\nconfused and we crash. Fix the problem by locking the moved directory.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53137"
        }
      ],
      "release_date": "2025-05-02T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2023-53125",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet: usb: smsc75xx: Limit packet length to skb->len\nPacket length retrieved from skb data may be larger than\nthe actual socket buffer length (up to 9026 bytes). In such\ncase the cloned skb passed up the network stack will leak\nkernel memory contents.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53125"
        }
      ],
      "release_date": "2025-05-02T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-50229",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nALSA: bcd2000: Fix a UAF bug on the error path of probing\nWhen the driver fails in snd_card_register() at probe time, it will free\nthe 'bcd2k->midi_out_urb' before killing it, which may cause a UAF bug.\nThe following log can reveal it:\n[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\n[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0\n[   50.729530] Call Trace:\n[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]\nFix this by adding usb_kill_urb() before usb_free_urb().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50229"
        }
      ],
      "release_date": "2025-06-18T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-50211",
      "cwe": {
        "id": "CWE-823",
        "name": "Use of Out-of-range Pointer Offset"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmd-raid10: fix KASAN warning\nThere's a KASAN warning in raid10_remove_disk when running the lvm\ntest lvconvert-raid-reshape.sh. We fix this warning by verifying that the\nvalue \"number\" is valid.\nBUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]\nRead of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682\nCPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n<TASK>\ndump_stack_lvl+0x34/0x44\nprint_report.cold+0x45/0x57a\n? __lock_text_start+0x18/0x18\n? raid10_remove_disk+0x61/0x2a0 [raid10]\nkasan_report+0xa8/0xe0\n? raid10_remove_disk+0x61/0x2a0 [raid10]\nraid10_remove_disk+0x61/0x2a0 [raid10]\nBuffer I/O error on dev dm-76, logical block 15344, async page read\n? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0\nremove_and_add_spares+0x367/0x8a0 [md_mod]\n? super_written+0x1c0/0x1c0 [md_mod]\n? mutex_trylock+0xac/0x120\n? _raw_spin_lock+0x72/0xc0\n? _raw_spin_lock_bh+0xc0/0xc0\nmd_check_recovery+0x848/0x960 [md_mod]\nraid10d+0xcf/0x3360 [raid10]\n? sched_clock_cpu+0x185/0x1a0\n? rb_erase+0x4d4/0x620\n? var_wake_function+0xe0/0xe0\n? psi_group_change+0x411/0x500\n? preempt_count_sub+0xf/0xc0\n? _raw_spin_lock_irqsave+0x78/0xc0\n? __lock_text_start+0x18/0x18\n? raid10_sync_request+0x36c0/0x36c0 [raid10]\n? preempt_count_sub+0xf/0xc0\n? _raw_spin_unlock_irqrestore+0x19/0x40\n? del_timer_sync+0xa9/0x100\n? try_to_del_timer_sync+0xc0/0xc0\n? _raw_spin_lock_irqsave+0x78/0xc0\n? __lock_text_start+0x18/0x18\n? _raw_spin_unlock_irq+0x11/0x24\n? __list_del_entry_valid+0x68/0xa0\n? finish_wait+0xa3/0x100\nmd_thread+0x161/0x260 [md_mod]\n? unregister_md_personality+0xa0/0xa0 [md_mod]\n? _raw_spin_lock_irqsave+0x78/0xc0\n? prepare_to_wait_event+0x2c0/0x2c0\n? unregister_md_personality+0xa0/0xa0 [md_mod]\nkthread+0x148/0x180\n? kthread_complete_and_exit+0x20/0x20\nret_from_fork+0x1f/0x30\n</TASK>\nAllocated by task 124495:\nkasan_save_stack+0x1e/0x40\n__kasan_kmalloc+0x80/0xa0\nsetup_conf+0x140/0x5c0 [raid10]\nraid10_run+0x4cd/0x740 [raid10]\nmd_run+0x6f9/0x1300 [md_mod]\nraid_ctr+0x2531/0x4ac0 [dm_raid]\ndm_table_add_target+0x2b0/0x620 [dm_mod]\ntable_load+0x1c8/0x400 [dm_mod]\nctl_ioctl+0x29e/0x560 [dm_mod]\ndm_compat_ctl_ioctl+0x7/0x20 [dm_mod]\n__do_compat_sys_ioctl+0xfa/0x160\ndo_syscall_64+0x90/0xc0\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\nLast potentially related work creation:\nkasan_save_stack+0x1e/0x40\n__kasan_record_aux_stack+0x9e/0xc0\nkvfree_call_rcu+0x84/0x480\ntimerfd_release+0x82/0x140\nL __fput+0xfa/0x400\ntask_work_run+0x80/0xc0\nexit_to_user_mode_prepare+0x155/0x160\nsyscall_exit_to_user_mode+0x12/0x40\ndo_syscall_64+0x42/0xc0\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\nSecond to last potentially related work creation:\nkasan_save_stack+0x1e/0x40\n__kasan_record_aux_stack+0x9e/0xc0\nkvfree_call_rcu+0x84/0x480\ntimerfd_release+0x82/0x140\n__fput+0xfa/0x400\ntask_work_run+0x80/0xc0\nexit_to_user_mode_prepare+0x155/0x160\nsyscall_exit_to_user_mode+0x12/0x40\ndo_syscall_64+0x42/0xc0\nentry_SYSCALL_64_after_hwframe+0x46/0xb0\nThe buggy address belongs to the object at ffff889108f3d200\nwhich belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n256-byte region [ffff889108f3d200, ffff889108f3d300)\nThe buggy address belongs to the physical page:\npage:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c\nhead:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0\nflags: 0x4000000000010200(slab|head|zone=2)\nraw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40\nraw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\nMemory state around the buggy address:\nffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\nffff889108f3d280: 00 00\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50211"
        }
      ],
      "release_date": "2025-06-18T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-49770",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nceph: avoid putting the realm twice when decoding snaps fails\nWhen decoding the snaps fails it maybe leaving the 'first_realm'\nand 'realm' pointing to the same snaprealm memory. And then it'll\nput it twice and could cause random use-after-free, BUG_ON, etc\nissues.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49770"
        }
      ],
      "release_date": "2025-05-01T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-49407",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndlm: fix plock invalid read\nThis patch fixes an invalid read showed by KASAN. A unlock will allocate a\n\"struct plock_op\" and a followed send_op() will append it to a global\nsend_list data structure. In some cases a followed dev_read() moves it\nto recv_list and dev_write() will cast it to \"struct plock_xop\" and access\nfields which are only available in those structures. At this point an\ninvalid read happens by accessing those fields.\nTo fix this issue the \"callback\" field is moved to \"struct plock_op\" to\nindicate that a cast to \"plock_xop\" is allowed and does the additional\n\"plock_xop\" handling if set.\nExample of the KASAN output which showed the invalid read:\n[ 2064.296453] ==================================================================\n[ 2064.304852] BUG: KASAN: slab-out-of-bounds in dev_write+0x52b/0x5a0 [dlm]\n[ 2064.306491] Read of size 8 at addr ffff88800ef227d8 by task dlm_controld/7484\n[ 2064.308168]\n[ 2064.308575] CPU: 0 PID: 7484 Comm: dlm_controld Kdump: loaded Not tainted 5.14.0+ #9\n[ 2064.310292] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\n[ 2064.311618] Call Trace:\n[ 2064.312218]  dump_stack_lvl+0x56/0x7b\n[ 2064.313150]  print_address_description.constprop.8+0x21/0x150\n[ 2064.314578]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.315610]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.316595]  kasan_report.cold.14+0x7f/0x11b\n[ 2064.317674]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.318687]  dev_write+0x52b/0x5a0 [dlm]\n[ 2064.319629]  ? dev_read+0x4a0/0x4a0 [dlm]\n[ 2064.320713]  ? bpf_lsm_kernfs_init_security+0x10/0x10\n[ 2064.321926]  vfs_write+0x17e/0x930\n[ 2064.322769]  ? __fget_light+0x1aa/0x220\n[ 2064.323753]  ksys_write+0xf1/0x1c0\n[ 2064.324548]  ? __ia32_sys_read+0xb0/0xb0\n[ 2064.325464]  do_syscall_64+0x3a/0x80\n[ 2064.326387]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 2064.327606] RIP: 0033:0x7f807e4ba96f\n[ 2064.328470] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 39 87 f8 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 7c 87 f8 ff 48\n[ 2064.332902] RSP: 002b:00007ffd50cfe6e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\n[ 2064.334658] RAX: ffffffffffffffda RBX: 000055cc3886eb30 RCX: 00007f807e4ba96f\n[ 2064.336275] RDX: 0000000000000040 RSI: 00007ffd50cfe7e0 RDI: 0000000000000010\n[ 2064.337980] RBP: 00007ffd50cfe7e0 R08: 0000000000000000 R09: 0000000000000001\n[ 2064.339560] R10: 000055cc3886eb30 R11: 0000000000000293 R12: 000055cc3886eb80\n[ 2064.341237] R13: 000055cc3886eb00 R14: 000055cc3886f590 R15: 0000000000000001\n[ 2064.342857]\n[ 2064.343226] Allocated by task 12438:\n[ 2064.344057]  kasan_save_stack+0x1c/0x40\n[ 2064.345079]  __kasan_kmalloc+0x84/0xa0\n[ 2064.345933]  kmem_cache_alloc_trace+0x13b/0x220\n[ 2064.346953]  dlm_posix_unlock+0xec/0x720 [dlm]\n[ 2064.348811]  do_lock_file_wait.part.32+0xca/0x1d0\n[ 2064.351070]  fcntl_setlk+0x281/0xbc0\n[ 2064.352879]  do_fcntl+0x5e4/0xfe0\n[ 2064.354657]  __x64_sys_fcntl+0x11f/0x170\n[ 2064.356550]  do_syscall_64+0x3a/0x80\n[ 2064.358259]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 2064.360745]\n[ 2064.361511] Last potentially related work creation:\n[ 2064.363957]  kasan_save_stack+0x1c/0x40\n[ 2064.365811]  __kasan_record_aux_stack+0xaf/0xc0\n[ 2064.368100]  call_rcu+0x11b/0xf70\n[ 2064.369785]  dlm_process_incoming_buffer+0x47d/0xfd0 [dlm]\n[ 2064.372404]  receive_from_sock+0x290/0x770 [dlm]\n[ 2064.374607]  process_recv_sockets+0x32/0x40 [dlm]\n[ 2064.377290]  process_one_work+0x9a8/0x16e0\n[ 2064.379357]  worker_thread+0x87/0xbf0\n[ 2064.381188]  kthread+0x3ac/0x490\n[ 2064.383460]  ret_from_fork+0x22/0x30\n[ 2064.385588]\n[ 2064.386518] Second to last potentially related work creation:\n[ 2064.389219]  kasan_save_stack+0x1c/0x40\n[ 2064.391043]  __kasan_record_aux_stack+0xaf/0xc0\n[ 2064.393303]  call_rcu+0x11b/0xf70\n[ 2064.394885]  dlm_process_incoming_buffer+0x47d/0xfd0 [dlm]\n[ 2064.397694]  receive_from_sock+0x290/0x770 \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49407"
        }
      ],
      "release_date": "2025-02-26T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-49122",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndm ioctl: prevent potential spectre v1 gadget\nIt appears like cmd could be a Spectre v1 gadget as it's supplied by a\nuser and used as an array index. Prevent the contents of kernel memory\nfrom being leaked to userspace via speculative execution by using\narray_index_nospec.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49122"
        }
      ],
      "release_date": "2025-02-26T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-49114",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: libfc: Fix use after free in fc_exch_abts_resp()\nfc_exch_release(ep) will decrease the ep's reference count. When the\nreference count reaches zero, it is freed. But ep is still used in the\nfollowing code, which will lead to a use after free.\nReturn after the fc_exch_release() call to avoid use after free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49114"
        }
      ],
      "release_date": "2025-02-26T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-49058",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: potential buffer overflow in handling symlinks\n\nSmatch printed a warning:\n\tarch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error:\n\t__memcpy() 'dctx->buf' too small (16 vs u32max)\n\nIt's caused because Smatch marks 'link_len' as untrusted since it comes\nfrom sscanf(). Add a check to ensure that 'link_len' is not larger than\nthe size of the 'link_str' buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49058"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1316c28569a80ab3596eeab05bf5e01991e7e739",
          "url": "https://git.kernel.org/stable/c/1316c28569a80ab3596eeab05bf5e01991e7e739"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22d658c6c5affed10c8907e67160cef0b6c92186",
          "url": "https://git.kernel.org/stable/c/22d658c6c5affed10c8907e67160cef0b6c92186"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e582749e742e662a8e9bb37cffac62dccaaa1e2",
          "url": "https://git.kernel.org/stable/c/3e582749e742e662a8e9bb37cffac62dccaaa1e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4e166a41180be2f1e66bbb6d46448e80a9a5ec05",
          "url": "https://git.kernel.org/stable/c/4e166a41180be2f1e66bbb6d46448e80a9a5ec05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/515e7ba11ef043d6febe69389949c8ef5f25e9d0",
          "url": "https://git.kernel.org/stable/c/515e7ba11ef043d6febe69389949c8ef5f25e9d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304",
          "url": "https://git.kernel.org/stable/c/64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9901b07ba42b39266b34a888e48d7306fd707bee",
          "url": "https://git.kernel.org/stable/c/9901b07ba42b39266b34a888e48d7306fd707bee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eb5f51756944735ac70cd8bb38637cc202e29c91",
          "url": "https://git.kernel.org/stable/c/eb5f51756944735ac70cd8bb38637cc202e29c91"
        }
      ],
      "release_date": "2025-02-26T07:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-48919",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix double free race when mount fails in cifs_get_root()\n\nWhen cifs_get_root() fails during cifs_smb3_do_mount() we call\ndeactivate_locked_super() which eventually will call delayed_free() which\nwill free the context.\nIn this situation we should not proceed to enter the out: section in\ncifs_smb3_do_mount() and free the same resources a second time.\n\n[Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0\n\n[Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G           OE     5.17.0-rc3+ #4\n[Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019\n[Thu Feb 10 12:59:06 2022] Call Trace:\n[Thu Feb 10 12:59:06 2022]  <IRQ>\n[Thu Feb 10 12:59:06 2022]  dump_stack_lvl+0x5d/0x78\n[Thu Feb 10 12:59:06 2022]  print_address_description.constprop.0+0x24/0x150\n[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022]  kasan_report.cold+0x7d/0x117\n[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022]  __asan_load8+0x86/0xa0\n[Thu Feb 10 12:59:06 2022]  rcu_cblist_dequeue+0x32/0x60\n[Thu Feb 10 12:59:06 2022]  rcu_core+0x547/0xca0\n[Thu Feb 10 12:59:06 2022]  ? call_rcu+0x3c0/0x3c0\n[Thu Feb 10 12:59:06 2022]  ? __this_cpu_preempt_check+0x13/0x20\n[Thu Feb 10 12:59:06 2022]  ? lock_is_held_type+0xea/0x140\n[Thu Feb 10 12:59:06 2022]  rcu_core_si+0xe/0x10\n[Thu Feb 10 12:59:06 2022]  __do_softirq+0x1d4/0x67b\n[Thu Feb 10 12:59:06 2022]  __irq_exit_rcu+0x100/0x150\n[Thu Feb 10 12:59:06 2022]  irq_exit_rcu+0xe/0x30\n[Thu Feb 10 12:59:06 2022]  sysvec_hyperv_stimer0+0x9d/0xc0\n...\n[Thu Feb 10 12:59:07 2022] Freed by task 58179:\n[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50\n[Thu Feb 10 12:59:07 2022]  kasan_set_track+0x25/0x30\n[Thu Feb 10 12:59:07 2022]  kasan_set_free_info+0x24/0x40\n[Thu Feb 10 12:59:07 2022]  ____kasan_slab_free+0x137/0x170\n[Thu Feb 10 12:59:07 2022]  __kasan_slab_free+0x12/0x20\n[Thu Feb 10 12:59:07 2022]  slab_free_freelist_hook+0xb3/0x1d0\n[Thu Feb 10 12:59:07 2022]  kfree+0xcd/0x520\n[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0x149/0xbe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]\n[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140\n[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0\n[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210\n[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0\n[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\n[Thu Feb 10 12:59:07 2022] Last potentially related work creation:\n[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50\n[Thu Feb 10 12:59:07 2022]  __kasan_record_aux_stack+0xb6/0xc0\n[Thu Feb 10 12:59:07 2022]  kasan_record_aux_stack_noalloc+0xb/0x10\n[Thu Feb 10 12:59:07 2022]  call_rcu+0x76/0x3c0\n[Thu Feb 10 12:59:07 2022]  cifs_umount+0xce/0xe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  cifs_kill_sb+0xc8/0xe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  deactivate_locked_super+0x5d/0xd0\n[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0xab9/0xbe0 [cifs]\n[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]\n[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140\n[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0\n[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210\n[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0\n[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48919"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/147a0e71ccf96df9fc8c2ac500829d8e423ef02c",
          "url": "https://git.kernel.org/stable/c/147a0e71ccf96df9fc8c2ac500829d8e423ef02c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fe0e281f7ad0a62259649764228227dd6b2561d",
          "url": "https://git.kernel.org/stable/c/2fe0e281f7ad0a62259649764228227dd6b2561d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d6cc9898efdfb062efb74dc18cfc700e082f5d5",
          "url": "https://git.kernel.org/stable/c/3d6cc9898efdfb062efb74dc18cfc700e082f5d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/546d60859ecf13380fcabcbeace53a5971493a2b",
          "url": "https://git.kernel.org/stable/c/546d60859ecf13380fcabcbeace53a5971493a2b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/563431c1f3c8f2230e4a9c445fa23758742bc4f0",
          "url": "https://git.kernel.org/stable/c/563431c1f3c8f2230e4a9c445fa23758742bc4f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da834d6c1147c7519a9e55b510a03b7055104749",
          "url": "https://git.kernel.org/stable/c/da834d6c1147c7519a9e55b510a03b7055104749"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df9db1a2af37f39ad1653c7b9b0d275d72d0bc67",
          "url": "https://git.kernel.org/stable/c/df9db1a2af37f39ad1653c7b9b0d275d72d0bc67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e208668ef7ba23efcbf76a8200cab8deee501c4d",
          "url": "https://git.kernel.org/stable/c/e208668ef7ba23efcbf76a8200cab8deee501c4d"
        }
      ],
      "release_date": "2024-08-22T02:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38180",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet: atm: fix /proc/net/atm/lec handling\n/proc/net/atm/lec must ensure safety against dev_lec[] changes.\nIt appears it had dev_put() calls without prior dev_hold(),\nleading to imbalance and UAF.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38180"
        }
      ],
      "release_date": "2025-07-04T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38085",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process.  While I don't see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38085"
        }
      ],
      "release_date": "2025-06-28T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38079",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ncrypto: algif_hash - fix double free in hash_accept\nIf accept(2) is called on socket type algif_hash with\nMSG_MORE flag set and crypto_ahash_import fails,\nsk2 is freed. However, it is also freed in af_alg_release,\nleading to slab-use-after-free error.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38079"
        }
      ],
      "release_date": "2025-06-18T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2021-47110",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kvm: Disable kvmclock on all CPUs on shutdown\n\nCurrenly, we disable kvmclock from machine_shutdown() hook and this\nonly happens for boot CPU. We need to disable it for all CPUs to\nguard against memory corruption e.g. on restore from hibernate.\n\nNote, writing '0' to kvmclock MSR doesn't clear memory location, it\njust prevents hypervisor from updating the location so for the short\nwhile after write and while CPU is still alive, the clock remains usable\nand correct so we don't need to switch to some other clocksource.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47110"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1df2dc09926f61319116c80ee85701df33577d70",
          "url": "https://git.kernel.org/stable/c/1df2dc09926f61319116c80ee85701df33577d70"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b0becf8b1ecf642a9edaf4c9628ffc641e490d6",
          "url": "https://git.kernel.org/stable/c/3b0becf8b1ecf642a9edaf4c9628ffc641e490d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9084fe1b3572664ad276f427dce575f580c9799a",
          "url": "https://git.kernel.org/stable/c/9084fe1b3572664ad276f427dce575f580c9799a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c02027b5742b5aa804ef08a4a9db433295533046",
          "url": "https://git.kernel.org/stable/c/c02027b5742b5aa804ef08a4a9db433295533046"
        }
      ],
      "release_date": "2024-03-15T21:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2016-10044",
      "notes": [
        {
          "category": "description",
          "text": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2016-10044"
        },
        {
          "category": "external",
          "summary": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
          "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
        },
        {
          "category": "external",
          "summary": "http://source.android.com/security/bulletin/2017-02-01.html",
          "url": "http://source.android.com/security/bulletin/2017-02-01.html"
        },
        {
          "category": "external",
          "summary": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7",
          "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7"
        },
        {
          "category": "external",
          "summary": "http://www.securityfocus.com/bid/96122",
          "url": "http://www.securityfocus.com/bid/96122"
        },
        {
          "category": "external",
          "summary": "http://www.securitytracker.com/id/1037798",
          "url": "http://www.securitytracker.com/id/1037798"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a",
          "url": "https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a"
        }
      ],
      "release_date": "2017-02-07T07:59:00",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL_ACCESS",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38352",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nposix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()\nIf an exiting non-autoreaping task has already passed exit_notify() and\ncalls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent\nor debugger right after unlock_task_sighand().\nIf a concurrent posix_cpu_timer_del() runs at that moment, it won't be\nable to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or\nlock_task_sighand() will fail.\nAdd the tsk->exit_state check into run_posix_cpu_timers() to fix this.\nThis fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because\nexit_task_work() is called before exit_notify(). But the check still\nmakes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail\nanyway in this case.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38352"
        }
      ],
      "release_date": "2025-07-22T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-37878",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nperf/core: Fix WARN_ON(!ctx) in __free_event() for partial init\nMove the get_ctx(child_ctx) call and the child_event->ctx assignment to\noccur immediately after the child event is allocated. Ensure that\nchild_event->ctx is non-NULL before any subsequent error path within\ninherit_event calls free_event(), satisfying the assumptions of the\ncleanup code.\nDetails:\nThere's no clear Fixes tag, because this bug is a side-effect of\nmultiple interacting commits over time (up to 15 years old), not\na single regression.\nThe code initially incremented refcount then assigned context\nimmediately after the child_event was created. Later, an early\nvalidity check for child_event was added before the\nrefcount/assignment. Even later, a WARN_ON_ONCE() cleanup check was\nadded, assuming event->ctx is valid if the pmu_ctx is valid.\nThe problem is that the WARN_ON_ONCE() could trigger after the initial\ncheck passed but before child_event->ctx was assigned, violating its\nprecondition. The solution is to assign child_event->ctx right after\nits initial validation. This ensures the context exists for any\nsubsequent checks or cleanup routines, resolving the WARN_ON_ONCE().\nTo resolve it, defer the refcount update and child_event->ctx assignment\ndirectly after child_event->pmu_ctx is set but before checking if the\nparent event is orphaned. The cleanup routine depends on\nevent->pmu_ctx being non-NULL before it verifies event->ctx is\nnon-NULL. This also maintains the author's original intent of passing\nin child_ctx to find_get_pmu_context before its refcount/assignment.\n[ mingo: Expanded the changelog from another email by Gabriel Shahrouzi. ]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37878"
        }
      ],
      "release_date": "2025-05-09T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38332",
      "cwe": {
        "id": "CWE-170",
        "name": "Improper Null Termination"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nscsi: lpfc: Use memcpy() for BIOS version\nThe strlcat() with FORTIFY support is triggering a panic because it\nthinks the target buffer will overflow although the correct target\nbuffer size is passed in.\nAnyway, instead of memset() with 0 followed by a strlcat(), just use\nmemcpy() and ensure that the resulting buffer is NULL terminated.\nBIOSVersion is only used for the lpfc_printf_log() which expects a\nproperly terminated string.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38332"
        }
      ],
      "release_date": "2025-07-10T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38232",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nNFSD: fix race between nfsd registration and exports_proc\nAs of now nfsd calls create_proc_exports_entry() at start of init_nfsd\nand cleanup by remove_proc_entry() at last of exit_nfsd.\nWhich causes kernel OOPs if there is race between below 2 operations:\n(i) exportfs -r\n(ii) mount -t nfsd none /proc/fs/nfsd\nfor 5.4 kernel ARM64:\nCPU 1:\nel1_irq+0xbc/0x180\narch_counter_get_cntvct+0x14/0x18\nrunning_clock+0xc/0x18\npreempt_count_add+0x88/0x110\nprep_new_page+0xb0/0x220\nget_page_from_freelist+0x2d8/0x1778\n__alloc_pages_nodemask+0x15c/0xef0\n__vmalloc_node_range+0x28c/0x478\n__vmalloc_node_flags_caller+0x8c/0xb0\nkvmalloc_node+0x88/0xe0\nnfsd_init_net+0x6c/0x108 [nfsd]\nops_init+0x44/0x170\nregister_pernet_operations+0x114/0x270\nregister_pernet_subsys+0x34/0x50\ninit_nfsd+0xa8/0x718 [nfsd]\ndo_one_initcall+0x54/0x2e0\nCPU 2 :\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000010\nPC is at : exports_net_open+0x50/0x68 [nfsd]\nCall trace:\nexports_net_open+0x50/0x68 [nfsd]\nexports_proc_open+0x2c/0x38 [nfsd]\nproc_reg_open+0xb8/0x198\ndo_dentry_open+0x1c4/0x418\nvfs_open+0x38/0x48\npath_openat+0x28c/0xf18\ndo_filp_open+0x70/0xe8\ndo_sys_open+0x154/0x248\nSometimes it crashes at exports_net_open() and sometimes cache_seq_next_rcu().\nand same is happening on latest 6.14 kernel as well:\n[    0.000000] Linux version 6.14.0-rc5-next-20250304-dirty\n...\n[  285.455918] Unable to handle kernel paging request at virtual address 00001f4800001f48\n...\n[  285.464902] pc : cache_seq_next_rcu+0x78/0xa4\n...\n[  285.469695] Call trace:\n[  285.470083]  cache_seq_next_rcu+0x78/0xa4 (P)\n[  285.470488]  seq_read+0xe0/0x11c\n[  285.470675]  proc_reg_read+0x9c/0xf0\n[  285.470874]  vfs_read+0xc4/0x2fc\n[  285.471057]  ksys_read+0x6c/0xf4\n[  285.471231]  __arm64_sys_read+0x1c/0x28\n[  285.471428]  invoke_syscall+0x44/0x100\n[  285.471633]  el0_svc_common.constprop.0+0x40/0xe0\n[  285.471870]  do_el0_svc_compat+0x1c/0x34\n[  285.472073]  el0_svc_compat+0x2c/0x80\n[  285.472265]  el0t_32_sync_handler+0x90/0x140\n[  285.472473]  el0t_32_sync+0x19c/0x1a0\n[  285.472887] Code: f9400885 93407c23 937d7c27 11000421 (f86378a3)\n[  285.473422] ---[ end trace 0000000000000000 ]---\nIt reproduced simply with below script:\nwhile [ 1 ]\ndo\n/exportfs -r\ndone &\nwhile [ 1 ]\ndo\ninsmod /nfsd.ko\nmount -t nfsd none /proc/fs/nfsd\numount /proc/fs/nfsd\nrmmod nfsd\ndone &\nSo exporting interfaces to user space shall be done at last and\ncleanup at first place.\nWith change there is no Kernel OOPs.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38232"
        }
      ],
      "release_date": "2025-07-04T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38556",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nHID: core: Harden s32ton() against conversion to 0 bits\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity.  Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38556"
        }
      ],
      "release_date": "2025-08-19T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38498",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndo_change_type(): refuse to operate on unmounted/not ours mounts\nEnsure that propagation settings can only be changed for mounts located\nin the caller's mount namespace. This change aligns permission checking\nwith the rest of mount(2).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38498"
        }
      ],
      "release_date": "2025-07-30T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38495",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nHID: core: ensure the allocated report buffer can contain the reserved report ID\nWhen the report ID is not used, the low level transport drivers expect\nthe first byte to be 0. However, currently the allocated buffer not\naccount for that extra byte, meaning that instead of having 8 guaranteed\nbytes for implement to be working, we only have 7.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38495"
        }
      ],
      "release_date": "2025-07-28T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38494",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nHID: core: do not bypass hid_hw_raw_request\nhid_hw_raw_request() is actually useful to ensure the provided buffer\nand length are valid. Directly calling in the low level transport driver\nfunction bypassed those checks and allowed invalid paramto be used.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38494"
        }
      ],
      "release_date": "2025-07-28T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38177",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nsch_hfsc: make hfsc_qlen_notify() idempotent\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let's make it idempotent\nto ease qdisc_tree_reduce_backlog() callers' life:\n1. update_vf() decreases cl->cl_nactive, so we can check whether it is\nnon-zero before calling it.\n2. eltree_remove() always removes RB node cl->el_node, but we can use\nRB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38177"
        }
      ],
      "release_date": "2025-07-04T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-38000",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc's peek() operation before incrementing sch->q.qlen and\nsch->qstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc's qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\nThis patch fixes the bug by moving the increment of sch->q.qlen and\nsch->qstats.backlog before the call to the child qdisc's peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38000"
        }
      ],
      "release_date": "2025-06-06T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-21928",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()\n\nThe system can experience a random crash a few minutes after the driver is\nremoved. This issue occurs due to improper handling of memory freeing in\nthe ishtp_hid_remove() function.\n\nThe function currently frees the `driver_data` directly within the loop\nthat destroys the HID devices, which can lead to accessing freed memory.\nSpecifically, `hid_destroy_device()` uses `driver_data` when it calls\n`hid_ishtp_set_feature()` to power off the sensor, so freeing\n`driver_data` beforehand can result in accessing invalid memory.\n\nThis patch resolves the issue by storing the `driver_data` in a temporary\nvariable before calling `hid_destroy_device()`, and then freeing the\n`driver_data` after the device is destroyed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21928"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/01b18a330cda61cc21423a7d1af92cf31ded8f60",
          "url": "https://git.kernel.org/stable/c/01b18a330cda61cc21423a7d1af92cf31ded8f60"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/07583a0010696a17fb0942e0b499a62785c5fc9f",
          "url": "https://git.kernel.org/stable/c/07583a0010696a17fb0942e0b499a62785c5fc9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d",
          "url": "https://git.kernel.org/stable/c/0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/560f4d1299342504a6ab8a47f575b5e6b8345ada",
          "url": "https://git.kernel.org/stable/c/560f4d1299342504a6ab8a47f575b5e6b8345ada"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394",
          "url": "https://git.kernel.org/stable/c/cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3faae7f42181865c799d88c5054176f38ae4625",
          "url": "https://git.kernel.org/stable/c/d3faae7f42181865c799d88c5054176f38ae4625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dea6a349bcaf243fff95dfd0428a26be6a0fb44e",
          "url": "https://git.kernel.org/stable/c/dea6a349bcaf243fff95dfd0428a26be6a0fb44e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9",
          "url": "https://git.kernel.org/stable/c/eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9"
        }
      ],
      "release_date": "2025-04-01T16:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2022-50066",
      "cwe": {
        "id": "CWE-823",
        "name": "Use of Out-of-range Pointer Offset"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet: atlantic: fix aq_vec index out of range error\nThe final update statement of the for loop exceeds the array range, the\ndereference of self->aq_vec[i] is not checked and then leads to the\nindex out of range error.\nAlso fixed this kind of coding style in other for loop.\n[   97.937604] UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c:1404:48\n[   97.937607] index 8 is out of range for type 'aq_vec_s *[8]'\n[   97.937608] CPU: 38 PID: 3767 Comm: kworker/u256:18 Not tainted 5.19.0+ #2\n[   97.937610] Hardware name: Dell Inc. Precision 7865 Tower/, BIOS 1.0.0 06/12/2022\n[   97.937611] Workqueue: events_unbound async_run_entry_fn\n[   97.937616] Call Trace:\n[   97.937617]  <TASK>\n[   97.937619]  dump_stack_lvl+0x49/0x63\n[   97.937624]  dump_stack+0x10/0x16\n[   97.937626]  ubsan_epilogue+0x9/0x3f\n[   97.937627]  __ubsan_handle_out_of_bounds.cold+0x44/0x49\n[   97.937629]  ? __scm_send+0x348/0x440\n[   97.937632]  ? aq_vec_stop+0x72/0x80 [atlantic]\n[   97.937639]  aq_nic_stop+0x1b6/0x1c0 [atlantic]\n[   97.937644]  aq_suspend_common+0x88/0x90 [atlantic]\n[   97.937648]  aq_pm_suspend_poweroff+0xe/0x20 [atlantic]\n[   97.937653]  pci_pm_suspend+0x7e/0x1a0\n[   97.937655]  ? pci_pm_suspend_noirq+0x2b0/0x2b0\n[   97.937657]  dpm_run_callback+0x54/0x190\n[   97.937660]  __device_suspend+0x14c/0x4d0\n[   97.937661]  async_suspend+0x23/0x70\n[   97.937663]  async_run_entry_fn+0x33/0x120\n[   97.937664]  process_one_work+0x21f/0x3f0\n[   97.937666]  worker_thread+0x4a/0x3c0\n[   97.937668]  ? process_one_work+0x3f0/0x3f0\n[   97.937669]  kthread+0xf0/0x120\n[   97.937671]  ? kthread_complete_and_exit+0x20/0x20\n[   97.937672]  ret_from_fork+0x22/0x30\n[   97.937676]  </TASK>\nv2. fixed \"warning: variable 'aq_vec' set but not used\"\nv3. simplified a for loop",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50066"
        }
      ],
      "release_date": "2025-06-18T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    }
  ]
}