{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "ovl: Filter invalid inodes with missing lookup function {CVE-2024-56570}\n- ALSA: aloop: Fix racy access at PCM trigger {CVE-2026-23191}\n- media: imon: reorganize serialization {CVE-2025-39993}\n- usb: xhci: Fix inverted ring_xrun_event check in handle_tx_event() {CVE-2025-37882}\n- Revert \"VFS: Impose ordering on accesses of d_inode and d_flags\"\n- Revert \"VFS: Combine inode checks with d_is_negative() and d_is_positive() in pathwalk\"\n- Revert \"namei: d_is_negative() should be checked before ->d_seq validation\"\n- Revert \"namei: results of d_is_negative() should be checked after dentry revalidation\"\n- Revert \"namei: ->d_inode of a pinned dentry is stable only for positives\"\n- scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() {CVE-2026-23193}\n- net/sched: cls_u32: use skb_header_pointer_careful() {CVE-2026-23204}\n- net: add skb_header_pointer_careful() helper {CVE-2026-23204}\n- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089}\n- NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid {CVE-2025-68349}\n- net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/rhel7els/advisories/2026/clsa-2026_1775657177.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-08T21:50:49Z",
      "generator": {
        "date": "2026-04-08T21:50:49Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1775657177",
      "initial_release_date": "2026-04-08T14:06:20Z",
      "revision_history": [
        {
          "date": "2026-04-08T14:06:20Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-08T21:50:49Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "kernel: Fix of 9 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "Red-Hat-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python-perf@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@3.10.0-1160.144.1.el7.tuxcare.els4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-23089",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer->id_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n  get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n  get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n  mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n  snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n  ...\n  snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n  usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23089"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/51b1aa6fe7dc87356ba58df06afb9677c9b841ea",
          "url": "https://git.kernel.org/stable/c/51b1aa6fe7dc87356ba58df06afb9677c9b841ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56fb6efd5d04caf6f14994d51ec85393b9a896c6",
          "url": "https://git.kernel.org/stable/c/56fb6efd5d04caf6f14994d51ec85393b9a896c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7009daeefa945973a530b2f605fe445fc03747af",
          "url": "https://git.kernel.org/stable/c/7009daeefa945973a530b2f605fe445fc03747af"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7bff0156d13f0ad9436e5178b979b063d59f572a",
          "url": "https://git.kernel.org/stable/c/7bff0156d13f0ad9436e5178b979b063d59f572a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/930e69757b74c3ae083b0c3c7419bfe7f0edc7b2",
          "url": "https://git.kernel.org/stable/c/930e69757b74c3ae083b0c3c7419bfe7f0edc7b2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dc1a5dd80af1ee1f29d8375b12dd7625f6294dad",
          "url": "https://git.kernel.org/stable/c/dc1a5dd80af1ee1f29d8375b12dd7625f6294dad"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6f103a22b08daf5df2f4aa158081840e5910963",
          "url": "https://git.kernel.org/stable/c/e6f103a22b08daf5df2f4aa158081840e5910963"
        }
      ],
      "release_date": "2026-02-04T17:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T14:06:20.349789Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
          "product_ids": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23204",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5",
          "url": "https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943",
          "url": "https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8",
          "url": "https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7",
          "url": "https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5",
          "url": "https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5"
        }
      ],
      "release_date": "2026-02-14T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T14:06:20.349789Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
          "product_ids": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23074",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim <km.kim1503@gmail.com> managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n  ├── class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n  └── class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql's enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch->q.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql's\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2's lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc's\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem's delay), a dangling pointer is\naccessed causing GangMin's causing a UAF.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23074"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0686bedfed34155520f3f735cbf3210cb9044380",
          "url": "https://git.kernel.org/stable/c/0686bedfed34155520f3f735cbf3210cb9044380"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16ed73c1282d376b956bff23e5139add061767ba",
          "url": "https://git.kernel.org/stable/c/16ed73c1282d376b956bff23e5139add061767ba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4c7e8aa71c9232cba84c289b4b56cba80b280841",
          "url": "https://git.kernel.org/stable/c/4c7e8aa71c9232cba84c289b4b56cba80b280841"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b",
          "url": "https://git.kernel.org/stable/c/50da4b9d07a7a463e2cfb738f3ad4cff6b2c9c3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73d970ff0eddd874a84c953387c7f4464b705fc6",
          "url": "https://git.kernel.org/stable/c/73d970ff0eddd874a84c953387c7f4464b705fc6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae810e6a8ac4fe25042e6825d2a401207a2e41fb",
          "url": "https://git.kernel.org/stable/c/ae810e6a8ac4fe25042e6825d2a401207a2e41fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dad49a67c2d817bfec98e6e45121b351e3a0202c",
          "url": "https://git.kernel.org/stable/c/dad49a67c2d817bfec98e6e45121b351e3a0202c"
        }
      ],
      "release_date": "2026-02-04T17:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T14:06:20.349789Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
          "product_ids": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23191",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aloop: Fix racy access at PCM trigger\n\nThe PCM trigger callback of aloop driver tries to check the PCM state\nand stop the stream of the tied substream in the corresponding cable.\nSince both check and stop operations are performed outside the cable\nlock, this may result in UAF when a program attempts to trigger\nfrequently while opening/closing the tied stream, as spotted by\nfuzzers.\n\nFor addressing the UAF, this patch changes two things:\n- It covers the most of code in loopback_check_format() with\n  cable->lock spinlock, and add the proper NULL checks.  This avoids\n  already some racy accesses.\n- In addition, now we try to check the state of the capture PCM stream\n  that may be stopped in this function, which was the major pain point\n  leading to UAF.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23191"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5727ccf9d19ca414cb76d9b647883822e2789c2e",
          "url": "https://git.kernel.org/stable/c/5727ccf9d19ca414cb76d9b647883822e2789c2e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/826af7fa62e347464b1b4e0ba2fe19a92438084f",
          "url": "https://git.kernel.org/stable/c/826af7fa62e347464b1b4e0ba2fe19a92438084f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bad15420050db1803767e58756114800cce91ea4",
          "url": "https://git.kernel.org/stable/c/bad15420050db1803767e58756114800cce91ea4"
        }
      ],
      "release_date": "2026-02-14T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T14:06:20.349789Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
          "product_ids": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-56570",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\novl: Filter invalid inodes with missing lookup function\n\nAdd a check to the ovl_dentry_weird() function to prevent the\nprocessing of directory inodes that lack the lookup function.\nThis is important because such inodes can cause errors in overlayfs\nwhen passed to the lowerstack.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56570"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/065bf5dd21639f80e68450de16bda829784dbb8c",
          "url": "https://git.kernel.org/stable/c/065bf5dd21639f80e68450de16bda829784dbb8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f86e79c0b2287ffdabe6c1b305a36c4e0f40fe3",
          "url": "https://git.kernel.org/stable/c/5f86e79c0b2287ffdabe6c1b305a36c4e0f40fe3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72014e7745cc8250bb8f27bd78694dfd3f1b5773",
          "url": "https://git.kernel.org/stable/c/72014e7745cc8250bb8f27bd78694dfd3f1b5773"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/749eac5a6687ec99116e0691d0d71225254654e3",
          "url": "https://git.kernel.org/stable/c/749eac5a6687ec99116e0691d0d71225254654e3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8b359dddb418c60df1a69beea01d1b3322bfe83",
          "url": "https://git.kernel.org/stable/c/c8b359dddb418c60df1a69beea01d1b3322bfe83"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9248e2f73fb4afe08324485e98c815ac084d166",
          "url": "https://git.kernel.org/stable/c/f9248e2f73fb4afe08324485e98c815ac084d166"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff43d008bbf9b27ada434d6455f039a5ef6cee53",
          "url": "https://git.kernel.org/stable/c/ff43d008bbf9b27ada434d6455f039a5ef6cee53"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
        }
      ],
      "release_date": "2024-12-27T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T14:06:20.349789Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
          "product_ids": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-68349",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nNFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid\nFixes a crash when layout is null during this call stack:\nwrite_inode\n-> nfs4_write_inode\n-> pnfs_layoutcommit_inode\npnfs_set_layoutcommit relies on the lseg refcount to keep the layout\naround. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt\nto reference a null layout.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-68349"
        }
      ],
      "release_date": "2025-12-24T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T14:06:20.349789Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
          "product_ids": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23193",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess->session_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
          "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23193"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca",
          "url": "https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d",
          "url": "https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7",
          "url": "https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4",
          "url": "https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a",
          "url": "https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9",
          "url": "https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb",
          "url": "https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb"
        }
      ],
      "release_date": "2026-02-14T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T14:06:20.349789Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177",
          "product_ids": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775657177"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:bpftool-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-debug-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-headers-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:kernel-tools-libs-devel-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64",
            "Red-Hat-7:python-perf-0:3.10.0-1160.144.1.el7.tuxcare.els4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}