{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "ext4: fix possible UAF when remounting r/o a mmp-protected file system {CVE-2021-47342}\n- ext4: fix memory leak in ext4_fill_super\n- net: defer final 'struct net' free in netns dismantle {CVE-2024-56658}\n- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}\n- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701}\n- fix: virtio-net: Add validation for used length {CVE-2021-47352}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/rhel7els/advisories/2025/clsa-2025_1762244848.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1762244848",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1762244848"
      }
    ],
    "tracking": {
      "current_release_date": "2025-11-04T08:29:06Z",
      "generator": {
        "date": "2025-11-04T08:29:06Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1762244848",
      "initial_release_date": "2025-11-04T08:29:06Z",
      "revision_history": [
        {
          "date": "2025-11-04T08:29:06Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "kernel: Fix of 5 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "Red-Hat-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python-perf@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@3.10.0-1160.139.1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-56658",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: defer final 'struct net' free in netns dismantle\n\nIlya reported a slab-use-after-free in dst_destroy [1]\n\nIssue is in xfrm6_net_init() and xfrm4_net_init() :\n\nThey copy xfrm[46]_dst_ops_template into net->xfrm.xfrm[46]_dst_ops.\n\nBut net structure might be freed before all the dst callbacks are\ncalled. So when dst_destroy() calls later :\n\nif (dst->ops->destroy)\n    dst->ops->destroy(dst);\n\ndst->ops points to the old net->xfrm.xfrm[46]_dst_ops, which has been freed.\n\nSee a relevant issue fixed in :\n\nac888d58869b (\"net: do not delay dst_entries_add() in dst_release()\")\n\nA fix is to queue the 'struct net' to be freed after one\nanother cleanup_net() round (and existing rcu_barrier())\n\n[1]\n\nBUG: KASAN: slab-use-after-free in dst_destroy (net/core/dst.c:112)\nRead of size 8 at addr ffff8882137ccab0 by task swapper/37/0\nDec 03 05:46:18 kernel:\nCPU: 37 UID: 0 PID: 0 Comm: swapper/37 Kdump: loaded Not tainted 6.12.0 #67\nHardware name: Red Hat KVM/RHEL, BIOS 1.16.1-1.el9 04/01/2014\nCall Trace:\n <IRQ>\ndump_stack_lvl (lib/dump_stack.c:124)\nprint_address_description.constprop.0 (mm/kasan/report.c:378)\n? dst_destroy (net/core/dst.c:112)\nprint_report (mm/kasan/report.c:489)\n? dst_destroy (net/core/dst.c:112)\n? kasan_addr_to_slab (mm/kasan/common.c:37)\nkasan_report (mm/kasan/report.c:603)\n? dst_destroy (net/core/dst.c:112)\n? rcu_do_batch (kernel/rcu/tree.c:2567)\ndst_destroy (net/core/dst.c:112)\nrcu_do_batch (kernel/rcu/tree.c:2567)\n? __pfx_rcu_do_batch (kernel/rcu/tree.c:2491)\n? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4339 kernel/locking/lockdep.c:4406)\nrcu_core (kernel/rcu/tree.c:2825)\nhandle_softirqs (kernel/softirq.c:554)\n__irq_exit_rcu (kernel/softirq.c:589 kernel/softirq.c:428 kernel/softirq.c:637)\nirq_exit_rcu (kernel/softirq.c:651)\nsysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1049 arch/x86/kernel/apic/apic.c:1049)\n </IRQ>\n <TASK>\nasm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702)\nRIP: 0010:default_idle (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:92 arch/x86/kernel/process.c:743)\nCode: 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 6e ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 0f 00 2d c7 c9 27 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90\nRSP: 0018:ffff888100d2fe00 EFLAGS: 00000246\nRAX: 00000000001870ed RBX: 1ffff110201a5fc2 RCX: ffffffffb61a3e46\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffb3d4d123\nRBP: 0000000000000000 R08: 0000000000000001 R09: ffffed11c7e1835d\nR10: ffff888e3f0c1aeb R11: 0000000000000000 R12: 0000000000000000\nR13: ffff888100d20000 R14: dffffc0000000000 R15: 0000000000000000\n? ct_kernel_exit.constprop.0 (kernel/context_tracking.c:148)\n? cpuidle_idle_call (kernel/sched/idle.c:186)\ndefault_idle_call (./include/linux/cpuidle.h:143 kernel/sched/idle.c:118)\ncpuidle_idle_call (kernel/sched/idle.c:186)\n? __pfx_cpuidle_idle_call (kernel/sched/idle.c:168)\n? lock_release (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5848)\n? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406)\n? tsc_verify_tsc_adjust (arch/x86/kernel/tsc_sync.c:59)\ndo_idle (kernel/sched/idle.c:326)\ncpu_startup_entry (kernel/sched/idle.c:423 (discriminator 1))\nstart_secondary (arch/x86/kernel/smpboot.c:202 arch/x86/kernel/smpboot.c:282)\n? __pfx_start_secondary (arch/x86/kernel/smpboot.c:232)\n? soft_restart_cpu (arch/x86/kernel/head_64.S:452)\ncommon_startup_64 (arch/x86/kernel/head_64.S:414)\n </TASK>\nDec 03 05:46:18 kernel:\nAllocated by task 12184:\nkasan_save_stack (mm/kasan/common.c:48)\nkasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69)\n__kasan_slab_alloc (mm/kasan/common.c:319 mm/kasan/common.c:345)\nkmem_cache_alloc_noprof (mm/slub.c:4085 mm/slub.c:4134 mm/slub.c:4141)\ncopy_net_ns (net/core/net_namespace.c:421 net/core/net_namespace.c:480)\ncreate_new_namespaces\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56658"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f6ede9fbc747e2553612271bce108f7517e7a45",
          "url": "https://git.kernel.org/stable/c/0f6ede9fbc747e2553612271bce108f7517e7a45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3267b254dc0a04dfa362a2be24573cfa6d2d78f5",
          "url": "https://git.kernel.org/stable/c/3267b254dc0a04dfa362a2be24573cfa6d2d78f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6610c7f8a8d47fd1123eed55ba8c11c2444d8842",
          "url": "https://git.kernel.org/stable/c/6610c7f8a8d47fd1123eed55ba8c11c2444d8842"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b7a79e51297f7b82adb687086f5cb2da446f1e40",
          "url": "https://git.kernel.org/stable/c/b7a79e51297f7b82adb687086f5cb2da446f1e40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c261dcd61c9e88a8f1a66654354d32295a975230",
          "url": "https://git.kernel.org/stable/c/c261dcd61c9e88a8f1a66654354d32295a975230"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dac465986a4a38cd2f13e934f562b6ca344e5720",
          "url": "https://git.kernel.org/stable/c/dac465986a4a38cd2f13e934f562b6ca344e5720"
        }
      ],
      "release_date": "2024-12-27T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47342",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix possible UAF when remounting r/o a mmp-protected file system\n\nAfter commit 618f003199c6 (\"ext4: fix memory leak in\next4_fill_super\"), after the file system is remounted read-only, there\nis a race where the kmmpd thread can exit, causing sbi->s_mmp_tsk to\npoint at freed memory, which the call to ext4_stop_mmpd() can trip\nover.\n\nFix this by only allowing kmmpd() to exit when it is stopped via\next4_stop_mmpd().\n\nBug-Report-Link: <20210629143603.2166962-1-yebin10@huawei.com>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47342"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb",
          "url": "https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd",
          "url": "https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b",
          "url": "https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b"
        }
      ],
      "release_date": "2024-05-21T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48701",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it's interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48701"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712",
          "url": "https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936",
          "url": "https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf",
          "url": "https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0",
          "url": "https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251",
          "url": "https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd",
          "url": "https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061",
          "url": "https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf",
          "url": "https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf"
        }
      ],
      "release_date": "2024-05-03T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48827",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix the behavior of READ near OFFSET_MAX\n\nDan Aloni reports:\n> Due to commit 8cfb9015280d (\"NFS: Always provide aligned buffers to\n> the RPC read layers\") on the client, a read of 0xfff is aligned up\n> to server rsize of 0x1000.\n>\n> As a result, in a test where the server has a file of size\n> 0x7fffffffffffffff, and the client tries to read from the offset\n> 0x7ffffffffffff000, the read causes loff_t overflow in the server\n> and it returns an NFS code of EINVAL to the client. The client as\n> a result indefinitely retries the request.\n\nThe Linux NFS client does not handle NFS?ERR_INVAL, even though all\nNFS specifications permit servers to return that status code for a\nREAD.\n\nInstead of NFS?ERR_INVAL, have out-of-range READ requests succeed\nand return a short result. Set the EOF flag in the result to prevent\nthe client from retrying the READ request. This behavior appears to\nbe consistent with Solaris NFS servers.\n\nNote that NFSv3 and NFSv4 use u64 offset values on the wire. These\nmust be converted to loff_t internally before use -- an implicit\ntype cast is not adequate for this purpose. Otherwise VFS checks\nagainst sb->s_maxbytes do not work properly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48827"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0cb4d23ae08c48f6bf3c29a8e5c4a74b8388b960",
          "url": "https://git.kernel.org/stable/c/0cb4d23ae08c48f6bf3c29a8e5c4a74b8388b960"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1726a39b0879acfb490b22dca643f26f4f907da9",
          "url": "https://git.kernel.org/stable/c/1726a39b0879acfb490b22dca643f26f4f907da9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44502aca8e02ab32d6b0eb52e006a5ec9402719b",
          "url": "https://git.kernel.org/stable/c/44502aca8e02ab32d6b0eb52e006a5ec9402719b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6eff5c4277146a78b4fb8c9b668dd64542c41b0",
          "url": "https://git.kernel.org/stable/c/c6eff5c4277146a78b4fb8c9b668dd64542c41b0"
        }
      ],
      "release_date": "2024-07-16T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52868",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal: core: prevent potential string overflow\n\nThe dev->id value comes from ida_alloc() so it's a number between zero\nand INT_MAX.  If it's too high then these sprintf()s will overflow.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52868"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97",
          "url": "https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb",
          "url": "https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c",
          "url": "https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c",
          "url": "https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521",
          "url": "https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8",
          "url": "https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8",
          "url": "https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5",
          "url": "https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686",
          "url": "https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48738",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: ops: Reject out of bounds values in snd_soc_put_volsw()\n\nWe don't currently validate that the values being set are within the range\nwe advertised to userspace as being valid, do so and reject any values\nthat are out of range.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48738"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d",
          "url": "https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7",
          "url": "https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf",
          "url": "https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7",
          "url": "https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0",
          "url": "https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830",
          "url": "https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a",
          "url": "https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d",
          "url": "https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d"
        }
      ],
      "release_date": "2024-06-20T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47391",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n       CPU 1                                  CPU 2\n\nrdma_resolve_addr():\n  RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)  #1\n\n\t\t\t process_one_req(): for #1\n                          addr_handler():\n                            RDMA_CM_ADDR_QUERY -> RDMA_CM_ADDR_BOUND\n                            mutex_unlock(&id_priv->handler_mutex);\n                            [.. handler still running ..]\n\nrdma_resolve_addr():\n  RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)\n    !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n  _destroy_id():\n   cma_cancel_operation():\n    rdma_addr_cancel()\n\n                          // process_one_req() self removes it\n\t\t          spin_lock_bh(&lock);\n                           cancel_delayed_work(&req->work);\n\t                   if (!list_empty(&req->list)) == true\n\n      ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n   kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n                          addr_handler():\n\t                    mutex_lock(&id_priv->handler_mutex);\n                            !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn't cost anything in the normal flow\nthat never uses this strange error path.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47391"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03d884671572af8bcfbc9e63944c1021efce7589",
          "url": "https://git.kernel.org/stable/c/03d884671572af8bcfbc9e63944c1021efce7589"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/305d568b72f17f674155a2a8275f865f207b3808",
          "url": "https://git.kernel.org/stable/c/305d568b72f17f674155a2a8275f865f207b3808"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9a085fa9b7d644a234465091e038c1911e1a4f2a",
          "url": "https://git.kernel.org/stable/c/9a085fa9b7d644a234465091e038c1911e1a4f2a"
        }
      ],
      "release_date": "2024-05-21T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-38659",
      "cwe": {
        "id": "CWE-1284",
        "name": "Improper Validation of Specified Quantity in Input"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nenic: Validate length of nl attributes in enic_set_vf_port\n\nenic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE\nis of length PORT_PROFILE_MAX and that the nl attributes\nIFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.\nThese attributes are validated (in the function do_setlink in rtnetlink.c)\nusing the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE\nas NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and\nIFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation\nusing the policy is for the max size of the attributes and not on exact\nsize so the length of these attributes might be less than the sizes that\nenic_set_vf_port expects. This might cause an out of bands\nread access in the memcpys of the data of these\nattributes in enic_set_vf_port.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-38659"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/25571a12fbc8a1283bd8380d461267956fd426f7",
          "url": "https://git.kernel.org/stable/c/25571a12fbc8a1283bd8380d461267956fd426f7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b649d7e0cb42a660f0260ef25fd55fdc9c6c600",
          "url": "https://git.kernel.org/stable/c/2b649d7e0cb42a660f0260ef25fd55fdc9c6c600"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c0d36972edbe56fcf98899622d9b90ac9965227",
          "url": "https://git.kernel.org/stable/c/3c0d36972edbe56fcf98899622d9b90ac9965227"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7077c22f84f41974a711604a42fd0e0684232ee5",
          "url": "https://git.kernel.org/stable/c/7077c22f84f41974a711604a42fd0e0684232ee5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee1955a1509a921c05c70dad5d6fc8563dfcb31",
          "url": "https://git.kernel.org/stable/c/aee1955a1509a921c05c70dad5d6fc8563dfcb31"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ca63fb7af9d3e531aa25f7ae187bfc6c7166ec2d",
          "url": "https://git.kernel.org/stable/c/ca63fb7af9d3e531aa25f7ae187bfc6c7166ec2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e8021b94b0412c37bcc79027c2e382086b6ce449",
          "url": "https://git.kernel.org/stable/c/e8021b94b0412c37bcc79027c2e382086b6ce449"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f6638e955ca00c489894789492776842e102af9c",
          "url": "https://git.kernel.org/stable/c/f6638e955ca00c489894789492776842e102af9c"
        }
      ],
      "release_date": "2024-06-21T11:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38477",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/sched: sch_qfq: Fix race condition on qfq_aggregate\nA race condition can occur when 'agg' is modified in qfq_change_agg\n(called during qfq_enqueue) while other threads access it\nconcurrently. For example, qfq_dump_class may trigger a NULL\ndereference, and qfq_delete_class may cause a use-after-free.\nThis patch addresses the issue by:\n1. Moved qfq_destroy_class into the critical section.\n2. Added sch_tree_lock protection to qfq_dump_class and\nqfq_dump_class_stats.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38477"
        }
      ],
      "release_date": "2025-07-28T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.139.1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}