{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "xfrm: Duplicate SPI Handling {CVE-2025-39965}\n- xfrm: state: use atomic_inc_not_zero to increment refcount\n- padata: Fix pd UAF once and for all {CVE-2025-38584}\n- padata: Remove broken queue flushing {CVE-2023-52854}\n- padata: ensure padata_do_serial() runs on the correct CPU\n- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}\n- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}\n- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718}\n- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}\n- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}\n- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640}\n- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}\n- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}\n- ipvs: use explicitly signed chars\n- vt: Clear selection before changing the font {CVE-2022-49948}\n- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}\n- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}\n- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}\n- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}\n- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}\n- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}\n- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}\n- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}\n- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}\n- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}\n- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}\n- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}\n- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}\n- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}\n- net_sched: hfsc: Fix a UAF vulnerability in class handling\n- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/oraclelinux7els/advisories/2025/clsa-2025_1766599987.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
      }
    ],
    "tracking": {
      "current_release_date": "2025-12-25T10:51:02Z",
      "generator": {
        "date": "2025-12-25T10:51:02Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1766599987",
      "initial_release_date": "2025-12-24T18:13:09Z",
      "revision_history": [
        {
          "date": "2025-12-24T18:13:09Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-12-25T10:27:03Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2025-12-25T10:51:02Z",
          "number": "3",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "3"
    },
    "title": "kernel: Fix of 27 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Oracle Linux 7",
                "product": {
                  "name": "Oracle Linux 7",
                  "product_id": "Oracle-Linux-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Oracle Linux"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python-perf@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@3.10.0-1160.139.1.el7.tuxcare.els3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64 as a component of Oracle Linux 7",
          "product_id": "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Oracle-Linux-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-3640",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-3640"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGOIRR72OAFE53XZRUDZDP7INGLIC3E3/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGOIRR72OAFE53XZRUDZDP7INGLIC3E3/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD7VWUT7YAU4CJ247IF44NGVOAODAJGC/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD7VWUT7YAU4CJ247IF44NGVOAODAJGC/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG2UPX3MQ7RKRJEUMGEH2TLPKZJCBU5C/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG2UPX3MQ7RKRJEUMGEH2TLPKZJCBU5C/"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.211944",
          "url": "https://vuldb.com/?id.211944"
        }
      ],
      "release_date": "2022-10-21T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-23042",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-23042"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://xenbits.xenproject.org/xsa/advisory-396.txt",
          "url": "https://xenbits.xenproject.org/xsa/advisory-396.txt"
        }
      ],
      "release_date": "2022-03-10T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53365",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6mr: Fix skb_under_panic in ip6mr_cache_report()\n\nskbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4\n head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg\n ------------[ cut here ]------------\n kernel BUG at net/core/skbuff.c:192!\n invalid opcode: 0000 [#1] PREEMPT SMP KASAN\n CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: ipv6_addrconf addrconf_dad_work\n RIP: 0010:skb_panic+0x152/0x1d0\n Call Trace:\n  <TASK>\n  skb_push+0xc4/0xe0\n  ip6mr_cache_report+0xd69/0x19b0\n  reg_vif_xmit+0x406/0x690\n  dev_hard_start_xmit+0x17e/0x6e0\n  __dev_queue_xmit+0x2d6a/0x3d20\n  vlan_dev_hard_start_xmit+0x3ab/0x5c0\n  dev_hard_start_xmit+0x17e/0x6e0\n  __dev_queue_xmit+0x2d6a/0x3d20\n  neigh_connected_output+0x3ed/0x570\n  ip6_finish_output2+0x5b5/0x1950\n  ip6_finish_output+0x693/0x11c0\n  ip6_output+0x24b/0x880\n  NF_HOOK.constprop.0+0xfd/0x530\n  ndisc_send_skb+0x9db/0x1400\n  ndisc_send_rs+0x12a/0x6c0\n  addrconf_dad_completed+0x3c9/0xea0\n  addrconf_dad_work+0x849/0x1420\n  process_one_work+0xa22/0x16e0\n  worker_thread+0x679/0x10c0\n  ret_from_fork+0x28/0x60\n  ret_from_fork_asm+0x11/0x20\n\nWhen setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().\nreg_vif_xmit()\n    ip6mr_cache_report()\n        skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4\nAnd skb_push declared as:\n\tvoid *skb_push(struct sk_buff *skb, unsigned int len);\n\t\tskb->data -= len;\n\t\t//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850\nskb->data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53365"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0",
          "url": "https://git.kernel.org/stable/c/0438e60a00d4e335b3c36397dbf26c74b5d13ef0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346",
          "url": "https://git.kernel.org/stable/c/1683124129a4263dd5bce2475bab110e95fa0346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4",
          "url": "https://git.kernel.org/stable/c/1bb54a21f4d9b88442f8c3307c780e2db64417e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c",
          "url": "https://git.kernel.org/stable/c/30e0191b16e8a58e4620fa3e2839ddc7b9d4281c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560",
          "url": "https://git.kernel.org/stable/c/3326c711f18d18fe6e1f5d83d3a7eab07e5a1560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb",
          "url": "https://git.kernel.org/stable/c/691a09eecad97e745b9aa0e3918db46d020bdacb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd",
          "url": "https://git.kernel.org/stable/c/8382e7ed2d63e6c2daf6881fa091526dc6c879cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d",
          "url": "https://git.kernel.org/stable/c/a96d74d1076c82a4cef02c150d9996b21354c78d"
        }
      ],
      "release_date": "2025-09-17T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-49918",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix WARNING in __ip_vs_cleanup_batch()\n\nDuring the initialization of ip_vs_conn_net_init(), if file ip_vs_conn\nor ip_vs_conn_sync fails to be created, the initialization is successful\nby default. Therefore, the ip_vs_conn or ip_vs_conn_sync file doesn't\nbe found during the remove.\n\nThe following is the stack information:\nname 'ip_vs_conn_sync'\nWARNING: CPU: 3 PID: 9 at fs/proc/generic.c:712\nremove_proc_entry+0x389/0x460\nModules linked in:\nWorkqueue: netns cleanup_net\nRIP: 0010:remove_proc_entry+0x389/0x460\nCall Trace:\n<TASK>\n__ip_vs_cleanup_batch+0x7d/0x120\nops_exit_list+0x125/0x170\ncleanup_net+0x4ea/0xb00\nprocess_one_work+0x9bf/0x1710\nworker_thread+0x665/0x1080\nkthread+0x2e4/0x3a0\nret_from_fork+0x1f/0x30\n</TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49918"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d00c6a0da8ddcf75213e004765e4a42acc71d5d",
          "url": "https://git.kernel.org/stable/c/3d00c6a0da8ddcf75213e004765e4a42acc71d5d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ee2d6b726b0ce339e36569e5849692f4cf4595e",
          "url": "https://git.kernel.org/stable/c/5ee2d6b726b0ce339e36569e5849692f4cf4595e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7effc4ce3d1434ce6ff286866585a6e905fdbfc1",
          "url": "https://git.kernel.org/stable/c/7effc4ce3d1434ce6ff286866585a6e905fdbfc1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/931f56d59c854263b32075bfac56fdb3b1598d1b",
          "url": "https://git.kernel.org/stable/c/931f56d59c854263b32075bfac56fdb3b1598d1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e724220b826e008764309d2a1f55a9434a4e1530",
          "url": "https://git.kernel.org/stable/c/e724220b826e008764309d2a1f55a9434a4e1530"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f08ee2aa24c076f81d84e26e213d8c6f4efd9f50",
          "url": "https://git.kernel.org/stable/c/f08ee2aa24c076f81d84e26e213d8c6f4efd9f50"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-49917",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix WARNING in ip_vs_app_net_cleanup()\n\nDuring the initialization of ip_vs_app_net_init(), if file ip_vs_app\nfails to be created, the initialization is successful by default.\nTherefore, the ip_vs_app file doesn't be found during the remove in\nip_vs_app_net_cleanup(). It will cause WRNING.\n\nThe following is the stack information:\nname 'ip_vs_app'\nWARNING: CPU: 1 PID: 9 at fs/proc/generic.c:712 remove_proc_entry+0x389/0x460\nModules linked in:\nWorkqueue: netns cleanup_net\nRIP: 0010:remove_proc_entry+0x389/0x460\nCall Trace:\n<TASK>\nops_exit_list+0x125/0x170\ncleanup_net+0x4ea/0xb00\nprocess_one_work+0x9bf/0x1710\nworker_thread+0x665/0x1080\nkthread+0x2e4/0x3a0\nret_from_fork+0x1f/0x30\n</TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49917"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/06d7596d18725f1a93cf817662d36050e5afb989",
          "url": "https://git.kernel.org/stable/c/06d7596d18725f1a93cf817662d36050e5afb989"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2c8d81bdb2684d53d6cedad7410ba4cf9090e343",
          "url": "https://git.kernel.org/stable/c/2c8d81bdb2684d53d6cedad7410ba4cf9090e343"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5663ed63adb9619c98ab7479aa4606fa9b7a548c",
          "url": "https://git.kernel.org/stable/c/5663ed63adb9619c98ab7479aa4606fa9b7a548c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8457a00c981fe1a799ce34123908856b0f5973b8",
          "url": "https://git.kernel.org/stable/c/8457a00c981fe1a799ce34123908856b0f5973b8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97f872b00937f2689bff2dab4ad9ed259482840f",
          "url": "https://git.kernel.org/stable/c/97f872b00937f2689bff2dab4ad9ed259482840f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adc76740ccd52e4a1d910767cd1223e134a7078b",
          "url": "https://git.kernel.org/stable/c/adc76740ccd52e4a1d910767cd1223e134a7078b"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50258",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()\n\nThis patch fixes a stack-out-of-bounds read in brcmfmac that occurs\nwhen 'buf' that is not null-terminated is passed as an argument of\nstrsep() in brcmf_c_preinit_dcmds(). This buffer is filled with a firmware\nversion string by memcpy() in brcmf_fil_iovar_data_get().\nThe patch ensures buf is null-terminated.\n\nFound by a modified version of syzkaller.\n\n[   47.569679][ T1897] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43236b for chip BCM43236/3\n[   47.582839][ T1897] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available\n[   47.601565][ T1897] ==================================================================\n[   47.602574][ T1897] BUG: KASAN: stack-out-of-bounds in strsep+0x1b2/0x1f0\n[   47.603447][ T1897] Read of size 1 at addr ffffc90001f6f000 by task kworker/0:2/1897\n[   47.604336][ T1897]\n[   47.604621][ T1897] CPU: 0 PID: 1897 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #131\n[   47.605617][ T1897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\n[   47.606907][ T1897] Workqueue: usb_hub_wq hub_event\n[   47.607453][ T1897] Call Trace:\n[   47.607801][ T1897]  dump_stack_lvl+0x8e/0xd1\n[   47.608295][ T1897]  print_address_description.constprop.0.cold+0xf/0x334\n[   47.609009][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609434][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609863][ T1897]  kasan_report.cold+0x83/0xdf\n[   47.610366][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.610882][ T1897]  strsep+0x1b2/0x1f0\n[   47.611300][ T1897]  ? brcmf_fil_iovar_data_get+0x3a/0xf0\n[   47.611883][ T1897]  brcmf_c_preinit_dcmds+0x995/0xc40\n[   47.612434][ T1897]  ? brcmf_c_set_joinpref_default+0x100/0x100\n[   47.613078][ T1897]  ? rcu_read_lock_sched_held+0xa1/0xd0\n[   47.613662][ T1897]  ? rcu_read_lock_bh_held+0xb0/0xb0\n[   47.614208][ T1897]  ? lock_acquire+0x19d/0x4e0\n[   47.614704][ T1897]  ? find_held_lock+0x2d/0x110\n[   47.615236][ T1897]  ? brcmf_usb_deq+0x1a7/0x260\n[   47.615741][ T1897]  ? brcmf_usb_rx_fill_all+0x5a/0xf0\n[   47.616288][ T1897]  brcmf_attach+0x246/0xd40\n[   47.616758][ T1897]  ? wiphy_new_nm+0x1703/0x1dd0\n[   47.617280][ T1897]  ? kmemdup+0x43/0x50\n[   47.617720][ T1897]  brcmf_usb_probe+0x12de/0x1690\n[   47.618244][ T1897]  ? brcmf_usbdev_qinit.constprop.0+0x470/0x470\n[   47.618901][ T1897]  usb_probe_interface+0x2aa/0x760\n[   47.619429][ T1897]  ? usb_probe_device+0x250/0x250\n[   47.619950][ T1897]  really_probe+0x205/0xb70\n[   47.620435][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.621048][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.621595][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.622209][ T1897]  driver_probe_device+0x4e/0x150\n[   47.622739][ T1897]  __device_attach_driver+0x1cc/0x2a0\n[   47.623287][ T1897]  bus_for_each_drv+0x156/0x1d0\n[   47.623796][ T1897]  ? bus_rescan_devices+0x30/0x30\n[   47.624309][ T1897]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n[   47.624907][ T1897]  ? trace_hardirqs_on+0x46/0x160\n[   47.625437][ T1897]  __device_attach+0x23f/0x3a0\n[   47.625924][ T1897]  ? device_bind_driver+0xd0/0xd0\n[   47.626433][ T1897]  ? kobject_uevent_env+0x287/0x14b0\n[   47.627057][ T1897]  bus_probe_device+0x1da/0x290\n[   47.627557][ T1897]  device_add+0xb7b/0x1eb0\n[   47.628027][ T1897]  ? wait_for_completion+0x290/0x290\n[   47.628593][ T1897]  ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0\n[   47.629249][ T1897]  usb_set_configuration+0xf59/0x16f0\n[   47.629829][ T1897]  usb_generic_driver_probe+0x82/0xa0\n[   47.630385][ T1897]  usb_probe_device+0xbb/0x250\n[   47.630927][ T1897]  ? usb_suspend+0x590/0x590\n[   47.631397][ T1897]  really_probe+0x205/0xb70\n[   47.631855][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.632469][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.633002][ \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50258"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69",
          "url": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0",
          "url": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c",
          "url": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c",
          "url": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f",
          "url": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7",
          "url": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0",
          "url": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4",
          "url": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49870",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncapabilities: fix undefined behavior in bit shift for CAP_TO_MASK\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in security/commoncap.c:1252:2\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n cap_task_prctl+0x561/0x6f0\n security_task_prctl+0x5a/0xb0\n __x64_sys_prctl+0x61/0x8f0\n do_syscall_64+0x58/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49870"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/151dc8087b5609e53b069c068e3f3ee100efa586",
          "url": "https://git.kernel.org/stable/c/151dc8087b5609e53b069c068e3f3ee100efa586"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27bdb134c043ff32c459d98f16550d0ffa0b3c34",
          "url": "https://git.kernel.org/stable/c/27bdb134c043ff32c459d98f16550d0ffa0b3c34"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13",
          "url": "https://git.kernel.org/stable/c/46653972e3ea64f79e7f8ae3aa41a4d3fdb70a13"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5661f111a1616ac105ec8cec81bff99b60f847ac",
          "url": "https://git.kernel.org/stable/c/5661f111a1616ac105ec8cec81bff99b60f847ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b79fa628e2ab789e629a83cd211ef9b4c1a593e",
          "url": "https://git.kernel.org/stable/c/5b79fa628e2ab789e629a83cd211ef9b4c1a593e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65b0bc7a0690861812ade523d19f82688ab819dc",
          "url": "https://git.kernel.org/stable/c/65b0bc7a0690861812ade523d19f82688ab819dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dbaab08c8677d598244d21afb7818e44e1c5d826",
          "url": "https://git.kernel.org/stable/c/dbaab08c8677d598244d21afb7818e44e1c5d826"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fcbd2b336834bd24e1d9454ad5737856470c10d7",
          "url": "https://git.kernel.org/stable/c/fcbd2b336834bd24e1d9454ad5737856470c10d7"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50252",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Do not free q_vector unless new one was allocated\n\nAvoid potential use-after-free condition under memory pressure. If the\nkzalloc() fails, q_vector will be freed but left in the original\nadapter->q_vector[v_idx] array position.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50252"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633",
          "url": "https://git.kernel.org/stable/c/0200f0fbb11e359cc35af72ab10b2ec224e6f633"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801",
          "url": "https://git.kernel.org/stable/c/0668716506ca66f90d395f36ccdaebc3e0e84801"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8",
          "url": "https://git.kernel.org/stable/c/314f7092b27749bdde44c14095b5533afa2a3bc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff",
          "url": "https://git.kernel.org/stable/c/3cb18dea11196fb4a06f78294cec5e61985e1aff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c",
          "url": "https://git.kernel.org/stable/c/56483aecf6b22eb7dff6315b3a174688c6ad494c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803",
          "url": "https://git.kernel.org/stable/c/64ca1969599857143e91aeec4440640656100803"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3",
          "url": "https://git.kernel.org/stable/c/68e8adbcaf7a8743e473343b38b9dad66e2ac6f3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a",
          "url": "https://git.kernel.org/stable/c/6e399577bd397a517df4b938601108c63769ce0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075",
          "url": "https://git.kernel.org/stable/c/f96bd8adc8adde25390965a8c1ee81b73cb62075"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50085",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_resume\n\nThere is a KASAN warning in raid_resume when running the lvm test\nlvconvert-raid.sh. The reason for the warning is that mddev->raid_disks\nis greater than rs->raid_disks, so the loop touches one entry beyond\nthe allocated length.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50085"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a9faa704d83ff0b04387e385efd8ae21cd95af6",
          "url": "https://git.kernel.org/stable/c/2a9faa704d83ff0b04387e385efd8ae21cd95af6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3bfdc95466f5be4d8d95db5a5b470d61641a7c24",
          "url": "https://git.kernel.org/stable/c/3bfdc95466f5be4d8d95db5a5b470d61641a7c24"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/50235d9a1f1f742619ed9963cb9f240e5b821d46",
          "url": "https://git.kernel.org/stable/c/50235d9a1f1f742619ed9963cb9f240e5b821d46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71f601c779b3cc1baf497796f5b922c3fe5d2a1e",
          "url": "https://git.kernel.org/stable/c/71f601c779b3cc1baf497796f5b922c3fe5d2a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74af83732a39ab7d3bc9b49219a535853e25679f",
          "url": "https://git.kernel.org/stable/c/74af83732a39ab7d3bc9b49219a535853e25679f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dad24db59d2d2803576f2e3645728866a056dab",
          "url": "https://git.kernel.org/stable/c/7dad24db59d2d2803576f2e3645728866a056dab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2d47bef93fb74aa97d90f9a40ca657b8f376083",
          "url": "https://git.kernel.org/stable/c/c2d47bef93fb74aa97d90f9a40ca657b8f376083"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2f075e729636a44e98d9722e3852c2fa6fa49b6",
          "url": "https://git.kernel.org/stable/c/c2f075e729636a44e98d9722e3852c2fa6fa49b6"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50386",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix user-after-free\n\nThis uses l2cap_chan_hold_unless_zero() after calling\n__l2cap_get_chan_blah() to prevent the following trace:\n\nBluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref\n*kref)\nBluetooth: chan 0000000023c4974d\nBluetooth: parent 00000000ae861c08\n==================================================================\nBUG: KASAN: use-after-free in __mutex_waiter_is_first\nkernel/locking/mutex.c:191 [inline]\nBUG: KASAN: use-after-free in __mutex_lock_common\nkernel/locking/mutex.c:671 [inline]\nBUG: KASAN: use-after-free in __mutex_lock+0x278/0x400\nkernel/locking/mutex.c:729\nRead of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50386"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0c108cf3ad386e0084277093b55a351c49e0be27",
          "url": "https://git.kernel.org/stable/c/0c108cf3ad386e0084277093b55a351c49e0be27"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11e40d6c0823f699d8ad501e48d1c3ae4be386cd",
          "url": "https://git.kernel.org/stable/c/11e40d6c0823f699d8ad501e48d1c3ae4be386cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/15fc21695eb606bdc5d483b92118ee42610a952d",
          "url": "https://git.kernel.org/stable/c/15fc21695eb606bdc5d483b92118ee42610a952d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f",
          "url": "https://git.kernel.org/stable/c/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ffde6e03085874ae22263ff4cef4869f797e84f",
          "url": "https://git.kernel.org/stable/c/6ffde6e03085874ae22263ff4cef4869f797e84f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45",
          "url": "https://git.kernel.org/stable/c/7d6f9cb24d2b2f6b6370eac074e2e6b1bafdad45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/843fc4e386dd84b806a7f07fb062d8c3a44e5364",
          "url": "https://git.kernel.org/stable/c/843fc4e386dd84b806a7f07fb062d8c3a44e5364"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1e894f950ad48897d1a7cb05909ea29d8c3810e",
          "url": "https://git.kernel.org/stable/c/d1e894f950ad48897d1a7cb05909ea29d8c3810e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d91fc2836562f299f34e361e089e9fe154da4f73",
          "url": "https://git.kernel.org/stable/c/d91fc2836562f299f34e361e089e9fe154da4f73"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-20566",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-20566"
        },
        {
          "category": "external",
          "summary": "https://source.android.com/security/bulletin/pixel/2022-12-01",
          "url": "https://source.android.com/security/bulletin/pixel/2022-12-01"
        }
      ],
      "release_date": "2022-12-16T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49948",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvt: Clear selection before changing the font\n\nWhen changing the console font with ioctl(KDFONTOP) the new font size\ncan be bigger than the previous font. A previous selection may thus now\nbe outside of the new screen size and thus trigger out-of-bounds\naccesses to graphics memory if the selection is removed in\nvc_do_resize().\n\nPrevent such out-of-memory accesses by dropping the selection before the\nvarious con_font_set() console handlers are called.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49948"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285",
          "url": "https://git.kernel.org/stable/c/1cf1930369c9dc428d827b60260c53271bff3285"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db",
          "url": "https://git.kernel.org/stable/c/2535431ae967ad17585513649625fea7db28d4db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f",
          "url": "https://git.kernel.org/stable/c/566f9c9f89337792070b5a6062dff448b3e7977f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb",
          "url": "https://git.kernel.org/stable/c/989201bb8c00b222235aff04e6200230d29dc7bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a",
          "url": "https://git.kernel.org/stable/c/c555cf04684fde39b5b0dd9fd80730030ee10c4a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc",
          "url": "https://git.kernel.org/stable/c/c904fe03c4bd1f356a58797d39e2a5d0ca15cefc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e",
          "url": "https://git.kernel.org/stable/c/e9ba4611ddf676194385506222cce7b0844e708e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e",
          "url": "https://git.kernel.org/stable/c/f74b4a41c5d7c9522469917e3072e55d435efd9e"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53117",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: prevent out-of-bounds array speculation when closing a file descriptor\n\nGoogle-Bug-Id: 114199369",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53117"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69",
          "url": "https://git.kernel.org/stable/c/3d5d9501b634fd268eb56428cda92cd317752d69"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4",
          "url": "https://git.kernel.org/stable/c/609d54441493c99f21c1823dfd66fa7f4c512ff4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf",
          "url": "https://git.kernel.org/stable/c/6631c8da02cfad96c53b217cf647b511c7f34faf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830",
          "url": "https://git.kernel.org/stable/c/a759905de9cd6ec9ca08ceadf0920272772ed830"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06",
          "url": "https://git.kernel.org/stable/c/cec08b7d1ebcd3138d4658b3868ce26aeb1e8e06"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a",
          "url": "https://git.kernel.org/stable/c/eea8e4e056a5ffbeb539a13854c017d5d62c756a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b",
          "url": "https://git.kernel.org/stable/c/f31cd5da636682caea424fa1c22679016cbfc16b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315",
          "url": "https://git.kernel.org/stable/c/f8cd8754a03a3748384ee438c572423643c9c315"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37839",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: remove wrong sb->s_sequence check\n\nJournal emptiness is not determined by sb->s_sequence == 0 but rather by\nsb->s_start == 0 (which is set a few lines above). Furthermore 0 is a\nvalid transaction ID so the check can spuriously trigger. Remove the\ninvalid WARN_ON.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77",
          "url": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457",
          "url": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac",
          "url": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf",
          "url": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1",
          "url": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b",
          "url": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0",
          "url": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6",
          "url": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148",
          "url": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix use-after-free\n\nFix potential use-after-free in l2cap_le_command_rej.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
          "url": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
          "url": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8",
          "url": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
          "url": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
          "url": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b",
          "url": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f",
          "url": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df",
          "url": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39751",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"
      },
      "notes": [
        {
          "category": "description",
          "text": "No description is available for this CVE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39751"
        }
      ],
      "release_date": "2025-09-11T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38718",
      "cwe": {
        "id": "CWE-664",
        "name": "Improper Control of a Resource Through its Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nsctp: linearize cloned gso packets in sctp_rcv\nA cloned head skb still shares these frag skbs in fraglist with the\noriginal head skb. It's not safe to access these frag skbs.\nsyzbot reported two use-of-uninitialized-memory bugs caused by this:\nBUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\nsctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211\nsctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998\nsctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88\nsctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331\nsk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122\n__release_sock+0x1da/0x330 net/core/sock.c:3106\nrelease_sock+0x6b/0x250 net/core/sock.c:3660\nsctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360\nsctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885\nsctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031\ninet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851\nsock_sendmsg_nosec net/socket.c:718 [inline]\nand\nBUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\nsctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987\nsctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88\nsctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331\nsk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n__release_sock+0x1d3/0x330 net/core/sock.c:3213\nrelease_sock+0x6b/0x270 net/core/sock.c:3767\nsctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367\nsctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886\nsctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032\ninet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851\nsock_sendmsg_nosec net/socket.c:712 [inline]\nThis patch fixes it by linearizing cloned gso packets in sctp_rcv().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38718"
        }
      ],
      "release_date": "2025-09-04T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49907",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: fix undefined behavior in bit shift for __mdiobus_register\n\nShifting signed 32-bit value by 31 bits is undefined, so changing\nsignificant bit to unsigned. The UBSAN warning calltrace like below:\n\nUBSAN: shift-out-of-bounds in drivers/net/phy/mdio_bus.c:586:27\nleft shift of 1 by 31 places cannot be represented in type 'int'\nCall Trace:\n <TASK>\n dump_stack_lvl+0x7d/0xa5\n dump_stack+0x15/0x1b\n ubsan_epilogue+0xe/0x4e\n __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c\n __mdiobus_register+0x49d/0x4e0\n fixed_mdio_bus_init+0xd8/0x12d\n do_one_initcall+0x76/0x430\n kernel_init_freeable+0x3b3/0x422\n kernel_init+0x24/0x1e0\n ret_from_fork+0x1f/0x30\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49907"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7",
          "url": "https://git.kernel.org/stable/c/20ed01a7b9af6e6a3c33761eebbb710ea6dd49b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a",
          "url": "https://git.kernel.org/stable/c/40e4eb324c59e11fcb927aa46742d28aba6ecb8a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2",
          "url": "https://git.kernel.org/stable/c/4954b5359eb141499492fadfab891e28905509e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d",
          "url": "https://git.kernel.org/stable/c/634f066d02bdb22a26da7deb0c7617ab1a65fc9d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0",
          "url": "https://git.kernel.org/stable/c/6ce6f8f8f6316da6f92afe7490bc2f0b654d68e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e",
          "url": "https://git.kernel.org/stable/c/7006176a3c863e3e353ce1b8a349ef5bb1b9320e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d",
          "url": "https://git.kernel.org/stable/c/985a88bf0b27193522bba7856b1763f428cef19d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973",
          "url": "https://git.kernel.org/stable/c/a3fafc974be37319679f36dc4e7cca7db1e02973"
        }
      ],
      "release_date": "2025-05-01T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48900",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved:\nxen/netfront: react properly to failing gnttab_end_foreign_access_ref()",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48900"
        }
      ],
      "release_date": "2024-08-22T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-39965",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nxfrm: xfrm_alloc_spi shouldn't use 0 as SPI\nx->id.spi == 0 means \"no SPI assigned\", but since commit\n94f39804d891 (\"xfrm: Duplicate SPI Handling\"), we now create states\nand add them to the byspi list with this value.\n__xfrm_state_delete doesn't remove those states from the byspi list,\nsince they shouldn't be there, and this shows up as a UAF the next\ntime we go through the byspi list.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39965"
        }
      ],
      "release_date": "2025-10-13T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-53373",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Handle EBUSY correctly\n\nAs it is seqiv only handles the special return value of EINPROGERSS,\nwhich means that in all other cases it will free data related to the\nrequest.\n\nHowever, as the caller of seqiv may specify MAY_BACKLOG, we also need\nto expect EBUSY and treat it in the same way.  Otherwise backlogged\nrequests will trigger a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53373"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
          "url": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc",
          "url": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620",
          "url": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771",
          "url": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
          "url": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36",
          "url": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971",
          "url": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719",
          "url": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53000",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n    u16 type = nla_type(nla);\n\n    if (type == 0 || type > maxtype) {\n        /* error or continue */\n    }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff",
          "url": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45",
          "url": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d",
          "url": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184",
          "url": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455",
          "url": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455"
        }
      ],
      "release_date": "2025-03-27T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-21546",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix WRITE_SAME No Data Buffer crash\n\nIn newer version of the SBC specs, we have a NDOB bit that indicates there\nis no data buffer that gets written out. If this bit is set using commands\nlike \"sg_write_same --ndob\" we will crash in target_core_iblock/file's\nexecute_write_same handlers when we go to access the se_cmd->t_data_sg\nbecause its NULL.\n\nThis patch adds a check for the NDOB bit in the common WRITE SAME code\nbecause we don't support it. And, it adds a check for zero SG elements in\neach handler in case the initiator tries to send a normal WRITE SAME with\nno data buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-21546"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510",
          "url": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b",
          "url": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29",
          "url": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899",
          "url": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-02T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38250",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix use-after-free in vhci_flush()\n\nsyzbot reported use-after-free in vhci_flush() without repro. [0]\n\nFrom the splat, a thread close()d a vhci file descriptor while\nits device was being used by iotcl() on another thread.\n\nOnce the last fd refcnt is released, vhci_release() calls\nhci_unregister_dev(), hci_free_dev(), and kfree() for struct\nvhci_data, which is set to hci_dev->dev->driver_data.\n\nThe problem is that there is no synchronisation after unlinking\nhdev from hci_dev_list in hci_unregister_dev().  There might be\nanother thread still accessing the hdev which was fetched before\nthe unlink operation.\n\nWe can use SRCU for such synchronisation.\n\nLet's run hci_dev_reset() under SRCU and wait for its completion\nin hci_unregister_dev().\n\nAnother option would be to restore hci_dev->destruct(), which was\nremoved in commit 587ae086f6e4 (\"Bluetooth: Remove unused\nhci-destruct cb\").  However, this would not be a good solution, as\nwe should not run hci_unregister_dev() while there are in-flight\nioctl() requests, which could lead to another data-race KCSAN splat.\n\nNote that other drivers seem to have the same problem, for exmaple,\nvirtbt_remove().\n\n[0]:\nBUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\nBUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\nRead of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718\n\nCPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xd2/0x2b0 mm/kasan/report.c:521\n kasan_report+0x118/0x150 mm/kasan/report.c:634\n skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\n skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\n skb_queue_purge include/linux/skbuff.h:3368 [inline]\n vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69\n hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline]\n hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592\n sock_do_ioctl+0xd9/0x300 net/socket.c:1190\n sock_ioctl+0x576/0x790 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcf5b98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929\nRDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009\nRBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528\n </TASK>\n\nAllocated by task 6535:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359\n kmalloc_noprof include/linux/slab.h:905 [inline]\n kzalloc_noprof include/linux/slab.h:1039 [inline]\n vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635\n misc_open+0x2bc/0x330 drivers/char/misc.c:161\n chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414\n do_dentry_open+0xdf0/0x1970 fs/open.c:964\n vfs_open+0x3b/0x340 fs/open.c:1094\n do_open fs/namei.c:3887 [inline]\n path_openat+0x2ee5/0x3830 fs/name\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38250"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65",
          "url": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e",
          "url": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7",
          "url": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6",
          "url": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38584",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix pd UAF once and for all\n\nThere is a race condition/UAF in padata_reorder that goes back\nto the initial commit.  A reference count is taken at the start\nof the process in padata_do_parallel, and released at the end in\npadata_serial_worker.\n\nThis reference count is (and only is) required for padata_replace\nto function correctly.  If padata_replace is never called then\nthere is no issue.\n\nIn the function padata_reorder which serves as the core of padata,\nas soon as padata is added to queue->serial.list, and the associated\nspin lock released, that padata may be processed and the reference\ncount on pd would go away.\n\nFix this by getting the next padata before the squeue->serial lock\nis released.\n\nIn order to make this possible, simplify padata_reorder by only\ncalling it once the next padata arrives.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38584"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91",
          "url": "https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52",
          "url": "https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa",
          "url": "https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52854",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix refcnt handling in padata_free_shell()\n\nIn a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead\nto system UAF (Use-After-Free) issues. Due to the lengthy analysis of\nthe pcrypt_aead01 function call, I'll describe the problem scenario\nusing a simplified model:\n\nSuppose there's a user of padata named `user_function` that adheres to\nthe padata requirement of calling `padata_free_shell` after `serial()`\nhas been invoked, as demonstrated in the following code:\n\n```c\nstruct request {\n    struct padata_priv padata;\n    struct completion *done;\n};\n\nvoid parallel(struct padata_priv *padata) {\n    do_something();\n}\n\nvoid serial(struct padata_priv *padata) {\n    struct request *request = container_of(padata,\n    \t\t\t\tstruct request,\n\t\t\t\tpadata);\n    complete(request->done);\n}\n\nvoid user_function() {\n    DECLARE_COMPLETION(done)\n    padata->parallel = parallel;\n    padata->serial = serial;\n    padata_do_parallel();\n    wait_for_completion(&done);\n    padata_free_shell();\n}\n```\n\nIn the corresponding padata.c file, there's the following code:\n\n```c\nstatic void padata_serial_worker(struct work_struct *serial_work) {\n    ...\n    cnt = 0;\n\n    while (!list_empty(&local_list)) {\n        ...\n        padata->serial(padata);\n        cnt++;\n    }\n\n    local_bh_enable();\n\n    if (refcount_sub_and_test(cnt, &pd->refcnt))\n        padata_free_pd(pd);\n}\n```\n\nBecause of the high system load and the accumulation of unexecuted\nsoftirq at this moment, `local_bh_enable()` in padata takes longer\nto execute than usual. Subsequently, when accessing `pd->refcnt`,\n`pd` has already been released by `padata_free_shell()`, resulting\nin a UAF issue with `pd->refcnt`.\n\nThe fix is straightforward: add `refcount_dec_and_test` before calling\n`padata_free_pd` in `padata_free_shell`.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52854"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5",
          "url": "https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b",
          "url": "https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f",
          "url": "https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d",
          "url": "https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f",
          "url": "https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275",
          "url": "https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50408",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()\n\n> ret = brcmf_proto_tx_queue_data(drvr, ifp->ifidx, skb);\n\nmay be schedule, and then complete before the line\n\n> ndev->stats.tx_bytes += skb->len;\n\n[   46.912801] ==================================================================\n[   46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328\n[   46.935991]\n[   46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G           O      5.4.199-[REDACTED] #1\n[   46.947255] Hardware name: [REDACTED]\n[   46.954568] Call trace:\n[   46.957037]  dump_backtrace+0x0/0x2b8\n[   46.960719]  show_stack+0x24/0x30\n[   46.964052]  dump_stack+0x128/0x194\n[   46.967557]  print_address_description.isra.0+0x64/0x380\n[   46.972877]  __kasan_report+0x1d4/0x240\n[   46.976723]  kasan_report+0xc/0x18\n[   46.980138]  __asan_report_load4_noabort+0x18/0x20\n[   46.985027]  brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]\n[   46.990613]  dev_hard_start_xmit+0x1bc/0xda0\n[   46.994894]  sch_direct_xmit+0x198/0xd08\n[   46.998827]  __qdisc_run+0x37c/0x1dc0\n[   47.002500]  __dev_queue_xmit+0x1528/0x21f8\n[   47.006692]  dev_queue_xmit+0x24/0x30\n[   47.010366]  neigh_resolve_output+0x37c/0x678\n[   47.014734]  ip_finish_output2+0x598/0x2458\n[   47.018927]  __ip_finish_output+0x300/0x730\n[   47.023118]  ip_output+0x2e0/0x430\n[   47.026530]  ip_local_out+0x90/0x140\n[   47.030117]  igmpv3_sendpack+0x14c/0x228\n[   47.034049]  igmpv3_send_cr+0x384/0x6b8\n[   47.037895]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.042262]  call_timer_fn+0x1cc/0xbe8\n[   47.046021]  __run_timers+0x4d8/0xb28\n[   47.049693]  run_timer_softirq+0x24/0x40\n[   47.053626]  __do_softirq+0x2c0/0x117c\n[   47.057387]  irq_exit+0x2dc/0x388\n[   47.060715]  __handle_domain_irq+0xb4/0x158\n[   47.064908]  gic_handle_irq+0x58/0xb0\n[   47.068581]  el0_irq_naked+0x50/0x5c\n[   47.072162]\n[   47.073665] Allocated by task 328:\n[   47.077083]  save_stack+0x24/0xb0\n[   47.080410]  __kasan_kmalloc.isra.0+0xc0/0xe0\n[   47.084776]  kasan_slab_alloc+0x14/0x20\n[   47.088622]  kmem_cache_alloc+0x15c/0x468\n[   47.092643]  __alloc_skb+0xa4/0x498\n[   47.096142]  igmpv3_newpack+0x158/0xd78\n[   47.099987]  add_grhead+0x210/0x288\n[   47.103485]  add_grec+0x6b0/0xb70\n[   47.106811]  igmpv3_send_cr+0x2e0/0x6b8\n[   47.110657]  igmp_ifc_timer_expire+0x4c/0x118\n[   47.115027]  call_timer_fn+0x1cc/0xbe8\n[   47.118785]  __run_timers+0x4d8/0xb28\n[   47.122457]  run_timer_softirq+0x24/0x40\n[   47.126389]  __do_softirq+0x2c0/0x117c\n[   47.130142]\n[   47.131643] Freed by task 180:\n[   47.134712]  save_stack+0x24/0xb0\n[   47.138041]  __kasan_slab_free+0x108/0x180\n[   47.142146]  kasan_slab_free+0x10/0x18\n[   47.145904]  slab_free_freelist_hook+0xa4/0x1b0\n[   47.150444]  kmem_cache_free+0x8c/0x528\n[   47.154292]  kfree_skbmem+0x94/0x108\n[   47.157880]  consume_skb+0x10c/0x5a8\n[   47.161466]  __dev_kfree_skb_any+0x88/0xa0\n[   47.165598]  brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]\n[   47.171023]  brcmf_txfinalize+0xec/0x190 [brcmfmac]\n[   47.176016]  brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]\n[   47.182056]  brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]\n[   47.187568]  brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]\n[   47.192529]  brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]\n[   47.197859]  process_one_work+0x7fc/0x1a80\n[   47.201965]  worker_thread+0x31c/0xc40\n[   47.205726]  kthread+0x2d8/0x370\n[   47.208967]  ret_from_fork+0x10/0x18\n[   47.212546]\n[   47.214051] The buggy address belongs to the object at ffffff803f588280\n[   47.214051]  which belongs to the cache skbuff_head_cache of size 208\n[   47.227086] The buggy address is located 104 bytes inside of\n[   47.227086]  208-byte region [ffffff803f588280, ffffff803f588350)\n[   47.238814] The buggy address belongs to the page:\n[   47.243618] page:ffffffff00dd6200 refcount:1 mapcou\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50408"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560",
          "url": "https://git.kernel.org/stable/c/1613a7b24f1a7467cb727ba3ec77c9a808383560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02",
          "url": "https://git.kernel.org/stable/c/232d59eca07f6ea27307022a33d226aff373bd02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e",
          "url": "https://git.kernel.org/stable/c/27574a3f421c3a1694d0207f37c6bbf23d66978e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478",
          "url": "https://git.kernel.org/stable/c/3f42faf6db431e04bf942d2ebe3ae88975723478"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2",
          "url": "https://git.kernel.org/stable/c/49c742afd60f552fce7799287080db02bffe1db2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96",
          "url": "https://git.kernel.org/stable/c/c369836cff98d3877f98c98e15c0151462812d96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df",
          "url": "https://git.kernel.org/stable/c/d79f4d903e14dde822c60b5fd3bedc5a289d25df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed",
          "url": "https://git.kernel.org/stable/c/e01d96494a9de0f48b1167f0494f6d929fa773ed"
        }
      ],
      "release_date": "2025-09-18T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37882",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix isochronous Ring Underrun/Overrun event handling\n\nThe TRB pointer of these events points at enqueue at the time of error\noccurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we\nare handling the event, a new TD may be queued at this ring position.\n\nI can trigger this race by rising interrupt moderation to increase IRQ\nhandling delay. Similar delay may occur naturally due to system load.\n\nIf this ever happens after a Missed Service Error, missed TDs will be\nskipped and the new TD processed as if it matched the event. It could\nbe given back prematurely, risking data loss or buffer UAF by the xHC.\n\nDon't complete TDs on xrun events and don't warn if queued TDs don't\nmatch the event's TRB pointer, which can be NULL or a link/no-op TRB.\nDon't warn if there are no queued TDs at all.\n\nNow that it's safe, also handle xrun events if the skip flag is clear.\nThis ensures completion of any TD stuck in 'error mid TD' state right\nbefore the xrun event, which could happen if a driver submits a finite\nnumber of URBs to a buggy HC and then an error occurs on the last TD.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37882"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915",
          "url": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454",
          "url": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4",
          "url": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39797",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: Duplicate SPI Handling\n\nThe issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI\nNetlink message, which triggers the kernel function xfrm_alloc_spi().\nThis function is expected to ensure uniqueness of the Security Parameter\nIndex (SPI) for inbound Security Associations (SAs). However, it can\nreturn success even when the requested SPI is already in use, leading\nto duplicate SPIs assigned to multiple inbound SAs, differentiated\nonly by their destination addresses.\n\nThis behavior causes inconsistencies during SPI lookups for inbound packets.\nSince the lookup may return an arbitrary SA among those with the same SPI,\npacket processing can fail, resulting in packet drops.\n\nAccording to RFC 4301 section 4.4.2 , for inbound processing a unicast SA\nis uniquely identified by the SPI and optionally protocol.\n\nReproducing the Issue Reliably:\nTo consistently reproduce the problem, restrict the available SPI range in\ncharon.conf : spi_min = 0x10000000 spi_max = 0x10000002\nThis limits the system to only 2 usable SPI values.\nNext, create more than 2 Child SA. each using unique pair of src/dst address.\nAs soon as the 3rd Child SA is initiated, it will be assigned a duplicate\nSPI, since the SPI pool is already exhausted.\nWith a narrow SPI range, the issue is consistently reproducible.\nWith a broader/default range, it becomes rare and unpredictable.\n\nCurrent implementation:\nxfrm_spi_hash() lookup function computes hash using daddr, proto, and family.\nSo if two SAs have the same SPI but different destination addresses, then\nthey will:\na. Hash into different buckets\nb. Be stored in different linked lists (byspi + h)\nc. Not be seen in the same hlist_for_each_entry_rcu() iteration.\nAs a result, the lookup will result in NULL and kernel allows that Duplicate SPI\n\nProposed Change:\nxfrm_state_lookup_spi_proto() does a truly global search - across all states,\nregardless of hash bucket and matches SPI and proto.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39797"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe",
          "url": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38",
          "url": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544",
          "url": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299",
          "url": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47",
          "url": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47"
        }
      ],
      "release_date": "2025-09-12T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50084",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix address sanitizer warning in raid_status\n\nThere is this warning when using a kernel with the address sanitizer\nand running this testsuite:\nhttps://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid\n\n==================================================================\nBUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]\nRead of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319\nCPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.<snip> #1\nHardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\nCall Trace:\n <TASK>\n dump_stack_lvl+0x6a/0x9c\n print_address_description.constprop.0+0x1f/0x1e0\n print_report.cold+0x55/0x244\n kasan_report+0xc9/0x100\n raid_status+0x1747/0x2820 [dm_raid]\n dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]\n table_load+0x35c/0x630 [dm_mod]\n ctl_ioctl+0x411/0x630 [dm_mod]\n dm_ctl_ioctl+0xa/0x10 [dm_mod]\n __x64_sys_ioctl+0x12a/0x1a0\n do_syscall_64+0x5b/0x80\n\nThe warning is caused by reading conf->max_nr_stripes in raid_status. The\ncode in raid_status reads mddev->private, casts it to struct r5conf and\nreads the entry max_nr_stripes.\n\nHowever, if we have different raid type than 4/5/6, mddev->private\ndoesn't point to struct r5conf; it may point to struct r0conf, struct\nr1conf, struct r10conf or struct mpconf. If we cast a pointer to one\nof these structs to struct r5conf, we will be reading invalid memory\nand KASAN warns about it.\n\nFix this bug by reading struct r5conf only if raid type is 4, 5 or 6.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
          "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50084"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1ae0ebfb576b72c2ef400917a5484ebe7892d80b",
          "url": "https://git.kernel.org/stable/c/1ae0ebfb576b72c2ef400917a5484ebe7892d80b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1fbeea217d8f297fe0e0956a1516d14ba97d0396",
          "url": "https://git.kernel.org/stable/c/1fbeea217d8f297fe0e0956a1516d14ba97d0396"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49dba30638e091120256a9e89125340795f034dc",
          "url": "https://git.kernel.org/stable/c/49dba30638e091120256a9e89125340795f034dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4c233811a49578634d10a5e70a9dfa569d451e94",
          "url": "https://git.kernel.org/stable/c/4c233811a49578634d10a5e70a9dfa569d451e94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90b006da40dd42285b24dd3c940d2c32aca9a70b",
          "url": "https://git.kernel.org/stable/c/90b006da40dd42285b24dd3c940d2c32aca9a70b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4c6c07c92b6cba2bf3cb2dfa722debeaf8a8abe",
          "url": "https://git.kernel.org/stable/c/b4c6c07c92b6cba2bf3cb2dfa722debeaf8a8abe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b856ce5f4b55f752144baf17e9d5c415072652c5",
          "url": "https://git.kernel.org/stable/c/b856ce5f4b55f752144baf17e9d5c415072652c5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb583ca6125ac64c98e9d65128e95ebb5be7d322",
          "url": "https://git.kernel.org/stable/c/cb583ca6125ac64c98e9d65128e95ebb5be7d322"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8971b595d7adac3421c21f59918241f1574061e",
          "url": "https://git.kernel.org/stable/c/d8971b595d7adac3421c21f59918241f1574061e"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T18:13:09.045168Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987",
          "product_ids": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1766599987"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Oracle-Linux-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64",
            "Oracle-Linux-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}